WSEAS Transactions on Communications


Print ISSN: 1109-2742
E-ISSN: 2224-2864

Volume 16, 2017

Notice: As of 2014 and for the forthcoming years, the publication frequency/periodicity of WSEAS Journals is adapted to the 'continuously updated' model. What this means is that instead of being separated into issues, new papers will be added on a continuous basis, allowing a more regular flow and shorter publication times. The papers will appear in reverse order, therefore the most recent one will be on top.



A New Technique to Improve the 2-N-PSK Method for Detecting Wireless Pilot Contamination Attacks

AUTHORS: Dimitriya Mihaylova, Zlatka Valkova-Jarvis, Georgi Iliev

Download as PDF

ABSTRACT: Wireless communication systems are very vulnerable to pilot contamination attacks, which represents a major physical layer security issue. Hence, it is necessary to apply different approaches and methods to the detection of this type of attack. One effective method proposed in the literature is 2-N-PSK pilot detection, which consists of training with two random N-PSK pilots. Although the method is broadly effective, it is not able to detect an attack initiated during the transmission of the second pilot of the pair in the case when both the legitimate and non-legitimate pilots coincide. In this paper, an improvement to this method is proposed to detect an intrusion which misses the first pilot transmission and initiates an attack during the second training period. This improved technique is based on channel gain comparison and eliminates the need to use threshold values in the detection – a drawback of previously-existing solutions.

KEYWORDS: Wireless communication systems, Physical layer security, Pilot contamination attacks, 2-N-PSK pilot detection method, Channel state information, Detection statistic

REFERENCES:

[1] W. Trappe, The Challenges Facing Physical Layer Security, IEEE Communications Magazine, Vol. 53, No.6, 2015, pp. 16-20.

[2] Hui-Ming Wang and Xiang-Gen Xia, Enhancing Wireless Security via Cooperation: Signal Design and Optimization, IEEE Communications Magazine, Vol. 53, No. 12, 2015, pp. 47-53.

[3] Boulat A. Bash, Dennis Goeckel, Don Towsley, and Saikat Guha, Hiding Information in Noise: Fundamental Limits of Covert Wireless Communication, IEEE Communications Magazine, Vol. 53, No. 12, 2015, pp. 26-31.

[4] X. Zhou, B. Maham, A. Hjorungnes, Pilot Contamination for Active Eavesdropping, IEEE Trans. Wireless Commun., Vol. 11, No.3, 2012, pp. 903-907.

[5] Ta-Yuan Liu, Pin-Hsun Lin, Shih-Chun Lin, Y.-W. Peter Hong, Eduard Axel Jorswieck, To Avoid or Not to Avoid CSI Leakage in Physical Layer Secret Communication Systems, IEEE Communications Magazine., Vol. 53, No. 12, 2015, pp. 19-25.

[6] B. A. Bash, D. Goeckel, D. Towsley, Limits of Reliable Communication with Low Probability of Detection on AWGN Channels, IEEE JSAC, Vol. 31, No. 9, 2013, pp. 1921–1930.

[7] D. Kapetanovic, A. Al-Nahari, A. Stojanovic, F. Rusek, Detection of Active Eavesdroppers in Massive MIMO, Proc. IEEE Int. Symp. Personal Indoor and Mobile Radio Commun. (PIMRC), 2014, pp. 585-589.

[8] D. Kapetanovic, G. Zheng, K.-K. Wong, B. Ottersten, Detection of Pilot Contamination Attack Using Random Training and Massive MIMO, Proc. IEEE Int. Symp. Personal Indoor and Mobile Radio Commun. (PIMRC), 2013, pp. 13-18.

[9] D. Mihaylova, G. Iliev, Z. Valkova-Jarvis, Comparison of Methods for the Detection of Pilot Contamination Attacks, Proc. BalkanCom, Tirana, Albania, 2017.

[10] D. Kapetanovic, G. Zheng, F. Rusek, Physical Layer Security for Massive MIMO: An Overview on Passive Eavesdropping and Active Attacks, IEEE Commun. Magazine, Vol. 53, No. 6, 2015, pp. 21- 27.

WSEAS Transactions on Communications, ISSN / E-ISSN: 1109-2742 / 2224-2864, Volume 16, 2017, Art. #21, pp. 176-183


Copyright © 2017 Author(s) retain the copyright of this article. This article is published under the terms of the Creative Commons Attribution License 4.0

Bulletin Board

Currently:

The editorial board is accepting papers.


WSEAS Main Site