DOI QR코드

DOI QR Code

Spatial spectrum approach for pilot spoofing attack detection in MIMO systems

  • Ning, Lina (School of Information and Communication Engineering, Beijing University of Posts and Telecommunications) ;
  • Li, Bin (School of Information and Communication Engineering, Beijing University of Posts and Telecommunications) ;
  • Wang, Xiang (Beijing Jianyi Co., Ltd.) ;
  • Liu, Xiaoming (School of Information and Communication Engineering, Beijing University of Posts and Telecommunications) ;
  • Zhao, Chenglin (School of Information and Communication Engineering, Beijing University of Posts and Telecommunications)
  • Received : 2019.11.05
  • Accepted : 2020.12.21
  • Published : 2021.10.01

Abstract

In this study, a spatial spectrum method is proposed to cope with the pilot spoofing attack (PSA) problem by exploiting the of uplink-downlink channel reciprocity in time-division-duplex multiple-input multiple-output systems. First, the spoofing attack in the uplink stage is detected by a threshold derived from the predefined false alarm based on the estimated spatial spectrum. When the PSA occurs, the transmitter (That is Alice) can detect either one or two spatial spectrum peaks. Then, the legitimate user (That is Bob) and Eve are recognized in the downlink stage via the channel reciprocity property based on the difference between the spatial spectra if PSA occurs. This way, the presence of Eve and the direction of arrival of Eve and Bob can be identified at the transmitter end. Because noise is suppressed by a spatial spectrum, the detection performance is reliable even for low signal-noise ratios and a short training length. Consequently, Bob can use beamforming to transmit secure information during the data transmission stage. Theoretical analysis and numerical simulations are performed to evaluate the performance of the proposed scheme compared with conventional methods.

Keywords

Acknowledgement

This research was supported by the Young Talents Invitation Program of China Institute of Communications under Grant QT2017001, the Natural Science Foundation of China under Grant U1805262, and the 2019 Industrial Internet Innovation Development Project of Ministry of Industry and Information Technology of China Comprehensive Security Defense Platform Project for Industrial/Enterprise Networks.

References

  1. H. Hui et al., Secure relay and jammer selection for physical layer security, IEEE Signal Process. Lett. 22 (2015), 1147-1151. https://doi.org/10.1109/LSP.2014.2387860
  2. X. Zhou, B. Maham, and A. Hjorungnes, Pilot contamination for active eavesdropping, IEEE Trans. Wirel. Commun. 11 (2012), 903-907. https://doi.org/10.1109/TWC.2012.020712.111298
  3. A. D. Wyner, The wire-tap channel, Bell Labs Tech. J. 54 (1975), 1355-1387. https://doi.org/10.1002/j.1538-7305.1975.tb02040.x
  4. J. Yang et al., A semiblind two-way training method for discriminatory channel estimation in MIMO systems, IEEE Trans. Commun. 62 (2014), 2400-2410. https://doi.org/10.1109/TCOMM.2014.2326394
  5. X. Tian, M. Li, and Q. Liu, Random-training-assisted pilot spoofing detection and security enhancement, IEEE Access, 5 (2017), 27384-27399. https://doi.org/10.1109/ACCESS.2017.2765382
  6. J. K. Tugnait, Pilot spoofing attack detection and countermeasure, IEEE Trans. Commun. 66 (2018), 2093-2106. https://doi.org/10.1109/tcomm.2018.2797989
  7. J. K. Tugnait, On mitigation of pilot spoofing attack, in Proc. IEEE Int. Conf. Acoust., Speech Signal Process. (New Orleans, LA, USA), Mar. 2017, pp. 2097- 2101.
  8. H. Wang, K. Huang, and T. A. Tsiftsis, Multiple antennas secure transmission under pilot spoofing and jamming attack, IEEE J. Sel. Areas Commun. 36 (2018), 860-876. https://doi.org/10.1109/jsac.2018.2825148
  9. K. Huang et al., Pilot spoofing attack by multiple eavesdroppers, IEEE Trans. Wirel. Commun. 17 (2018), 6433-6447. https://doi.org/10.1109/twc.2018.2859949
  10. Q. Xiong et al., An energy-ratio-based approach for detecting pilot spoofing attack in multiple-antenna systems, IEEE Trans. Inform. Forensics Secur. 10 (2015), 932-940. https://doi.org/10.1109/TIFS.2015.2392564
  11. Q. Xiong et al., Secure transmission against pilot spoofing attack: A two-way training-based scheme, IEEE Trans. Inform. Forensics Secur. 11 (2016), 1017-1026. https://doi.org/10.1109/TIFS.2016.2516825
  12. X. Liu et al., Detecting pilot spoofing attack in MISO systems with trusted user, IEEE Commun. Lett. 23 (2019), 314-317. https://doi.org/10.1109/lcomm.2018.2889491
  13. B. Li et al., On the efficient beam-forming training for 60 GHz wireless personal area networks, IEEE Trans. Wirel. Commun. 12 (2013), 504-515. https://doi.org/10.1109/TWC.2012.121412.110419
  14. B. Li et al., Efficient beamforming training for 60-GHz millimeter-wave communications: A novel numerical optimization framework, IEEE Trans. Veh. Technol. 63 (2014), 703-717. https://doi.org/10.1109/TVT.2013.2279694
  15. W. Wang et al., On countermeasures of pilot spoofing attack in massive mimo systems: A double channel training based approach, IEEE Trans. Veh. Technol. 68 (2019), 6697-6708. https://doi.org/10.1109/tvt.2019.2916209
  16. S. Yan and R. Malaney, Line-of-sight based beamforming for security enhancements in wiretap channels, in Proc. Int. Conf. IT Convergence Secur. (ICITCS), (Beijing, China), Oct. 2014, pp. 1-4.
  17. P. Salvo Rossi et al., Performance analysis of energy detection for mimo decision fusion in wireless sensor networks over arbitrary fading channels, IEEE Trans. Wirel. Commun. 15 (2016), 7794-7806. https://doi.org/10.1109/TWC.2016.2607703
  18. D. Ciuonzo, A. Aubry, and V. Carotenuto, Rician mimo channeland jamming-aware decision fusion, IEEE Trans. Signal Process. 65 (2017), 3866-3880. https://doi.org/10.1109/TSP.2017.2686375
  19. T. Li and Y. Tang, Frequency estimation based on modulation FFT and MUSIC algorithm, in Proc. Int. Conf. Pervasive Comput., Signal Process. Appl. (Harbin, China), Sept. 2010, pp. 525-528.
  20. W. Q. Wang and Z. Zheng, Hybrid MIMO and phased-array directional modulation for physical layer security in mmWave wireless communications, IEEE J. Sel. Areas Commun. 36 (2018), no. 7, 1383-1396. https://doi.org/10.1109/jsac.2018.2825138