Pilot contamination for active eavesdropping

Xiangyun Zhou, Behrouz Maham, Are Hjørungnes

Research output: Contribution to journalArticle

135 Citations (Scopus)

Abstract

Existing studies on physical layer security often assume the availability of perfect channel state information (CSI) and overlook the importance of channel training needed for obtaining the CSI. In this letter, we discuss how an active eavesdropper can attack the training phase in wireless communication to improve its eavesdropping performance. We derive a new security attack from the pilot contamination phenomenon, which targets at systems using reverse training to obtain the CSI at the transmitter for precoder design. This attack changes the precoder used by the legitimate transmitter in a controlled manner to strengthen the signal reception at the eavesdropper during data transmission. Furthermore, we discuss an efficient use of the transmission energy of an advanced full-duplex eavesdropper to simultaneously achieve a satisfactory eavesdropping performance whilst degrading the detection performance of the legitimate receiver.

Original languageEnglish
Article number6151778
Pages (from-to)903-907
Number of pages5
JournalIEEE Transactions on Wireless Communications
Volume11
Issue number3
DOIs
Publication statusPublished - Mar 2012
Externally publishedYes

Fingerprint

Channel state information
Channel State Information
Contamination
Attack
Transmitter
Transmitters
Data Transmission
Wireless Communication
Data communication systems
Reverse
Receiver
Availability
Target
Communication
Energy
Training

Keywords

  • active eavesdropper
  • channel estimation
  • Physical layer security
  • pilot contamination

ASJC Scopus subject areas

  • Electrical and Electronic Engineering
  • Computer Science Applications
  • Applied Mathematics

Cite this

Pilot contamination for active eavesdropping. / Zhou, Xiangyun; Maham, Behrouz; Hjørungnes, Are.

In: IEEE Transactions on Wireless Communications, Vol. 11, No. 3, 6151778, 03.2012, p. 903-907.

Research output: Contribution to journalArticle

Zhou, Xiangyun ; Maham, Behrouz ; Hjørungnes, Are. / Pilot contamination for active eavesdropping. In: IEEE Transactions on Wireless Communications. 2012 ; Vol. 11, No. 3. pp. 903-907.
@article{7ac3388b71b241018822b312ecf87bf4,
title = "Pilot contamination for active eavesdropping",
abstract = "Existing studies on physical layer security often assume the availability of perfect channel state information (CSI) and overlook the importance of channel training needed for obtaining the CSI. In this letter, we discuss how an active eavesdropper can attack the training phase in wireless communication to improve its eavesdropping performance. We derive a new security attack from the pilot contamination phenomenon, which targets at systems using reverse training to obtain the CSI at the transmitter for precoder design. This attack changes the precoder used by the legitimate transmitter in a controlled manner to strengthen the signal reception at the eavesdropper during data transmission. Furthermore, we discuss an efficient use of the transmission energy of an advanced full-duplex eavesdropper to simultaneously achieve a satisfactory eavesdropping performance whilst degrading the detection performance of the legitimate receiver.",
keywords = "active eavesdropper, channel estimation, Physical layer security, pilot contamination",
author = "Xiangyun Zhou and Behrouz Maham and Are Hj{\o}rungnes",
year = "2012",
month = "3",
doi = "10.1109/TWC.2012.020712.111298",
language = "English",
volume = "11",
pages = "903--907",
journal = "IEEE Transactions on Wireless Communications",
issn = "1536-1276",
publisher = "Institute of Electrical and Electronics Engineers Inc.",
number = "3",

}

TY - JOUR

T1 - Pilot contamination for active eavesdropping

AU - Zhou, Xiangyun

AU - Maham, Behrouz

AU - Hjørungnes, Are

PY - 2012/3

Y1 - 2012/3

N2 - Existing studies on physical layer security often assume the availability of perfect channel state information (CSI) and overlook the importance of channel training needed for obtaining the CSI. In this letter, we discuss how an active eavesdropper can attack the training phase in wireless communication to improve its eavesdropping performance. We derive a new security attack from the pilot contamination phenomenon, which targets at systems using reverse training to obtain the CSI at the transmitter for precoder design. This attack changes the precoder used by the legitimate transmitter in a controlled manner to strengthen the signal reception at the eavesdropper during data transmission. Furthermore, we discuss an efficient use of the transmission energy of an advanced full-duplex eavesdropper to simultaneously achieve a satisfactory eavesdropping performance whilst degrading the detection performance of the legitimate receiver.

AB - Existing studies on physical layer security often assume the availability of perfect channel state information (CSI) and overlook the importance of channel training needed for obtaining the CSI. In this letter, we discuss how an active eavesdropper can attack the training phase in wireless communication to improve its eavesdropping performance. We derive a new security attack from the pilot contamination phenomenon, which targets at systems using reverse training to obtain the CSI at the transmitter for precoder design. This attack changes the precoder used by the legitimate transmitter in a controlled manner to strengthen the signal reception at the eavesdropper during data transmission. Furthermore, we discuss an efficient use of the transmission energy of an advanced full-duplex eavesdropper to simultaneously achieve a satisfactory eavesdropping performance whilst degrading the detection performance of the legitimate receiver.

KW - active eavesdropper

KW - channel estimation

KW - Physical layer security

KW - pilot contamination

UR - http://www.scopus.com/inward/record.url?scp=84862817856&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=84862817856&partnerID=8YFLogxK

U2 - 10.1109/TWC.2012.020712.111298

DO - 10.1109/TWC.2012.020712.111298

M3 - Article

VL - 11

SP - 903

EP - 907

JO - IEEE Transactions on Wireless Communications

JF - IEEE Transactions on Wireless Communications

SN - 1536-1276

IS - 3

M1 - 6151778

ER -