68 Hits in 5.7 sec

Stemming Downlink Leakage from Training Sequences in Multi-User MIMO Networks

Yunlong Mao, Yuan Zhang, Sheng Zhong
2016 Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security - CCS'16  
Following it, a malicious user can eavesdrop on other users' downloads by transforming training sequences. To prevent this attack, we propose a secure CSI estimation scheme for instantaneous CSI.  ...  Recently a serious eavesdropping attack, which exploits the CSI feedback of the FDD system, is discovered in MU-MIMO networks.  ...  EAVESDROPPING ATTACK BASED ON TRAINING SEQUENCE To do channel estimation normally, every MS should transmit commonly known training sequence.  ... 
doi:10.1145/2976749.2978412 dblp:conf/ccs/MaoZZ16 fatcat:qt5shmty4vfhhisvcyfnkfeifu

Security Vulnerability of FDD Massive MIMO Systems in Downlink Training Phase

Mohammad Amin Sheikhi, S. Mohammad Razavizadeh
2018 2018 9th International Symposium on Telecommunications (IST)  
The jammer intends to degrade mean square error (MSE) of the downlink channel training by designing an attack based on second-order statistics of its channel.  ...  We consider downlink channel training of a frequency division duplex (FDD) massive multiple-input-multiple-output (MIMO) system when a multi-antenna jammer is present in the network.  ...  Physical layer security is one of the most effective approaches to solve the security issues of wireless networks against eavesdropping and jamming attacks [12] .  ... 
doi:10.1109/istel.2018.8661082 dblp:conf/istel/SheikhiR18 fatcat:vgav5awml5hf5dpleut7bo5r6y

A Comparison of TDD and FDD Massive MIMO Systems Against Smart Jamming

Ashkan Sheikhi, S. Mohammad Razavizadeh, Inkyu Lee
2020 IEEE Access  
Obtaining the downlink CSI in the FDD massive MIMO systems may incur a huge training overhead which reduces the SE of the network.  ...  INDEX TERMS Frequency division duplex (FDD), massive MIMO, physical layer security, smart jamming, time division duplex (TDD). preferred in implementing massive MIMO systems.  ...  Massive MIMO has been shown to be resilient against passive eavesdropping due to high degree of freedom.  ... 
doi:10.1109/access.2020.2987606 fatcat:4rznhkihdbfqlnou36lbcyoiuu

MIMO Cross-Layer Secure Communication Algorithm for Cyber Physical Systems Based on Interference Strategies

Yukai Hao, Xin Qiu
2020 IEEE Access  
downlink channel at the macro base station utilizes the decoded uplink data and known training sequences.  ...  INDEX TERMS Jamming strategies, cyber physical systems, MIMO, cross-layer security, communication algorithms.  ...  MIMO systems, based on the channel estimation method of the training sequence.  ... 
doi:10.1109/access.2020.3045482 fatcat:moxw2abfh5hs5hj4yjo76kgoaq

Secrecy Analysis and Active Pilot Spoofing Attack Detection for Multigroup Multicasting Cell-Free Massive MIMO Systems

Xianyu Zhang, Daoxing Guo, Kang An, Zhiguo Ding, Bangning Zhang
2019 IEEE Access  
INDEX TERMS Physical layer security, cell-free massive MIMO, multigroup multicasting, pilot spoofing attack. 57332 2169-3536  ...  In this paper, we investigate the secure transmission in multigroup multicasting cell-free massive MIMO system in the presence of pilot spoofing attack.  ...  The passive eavesdropping and active attacks have been well considered in [15] , [16] and [17] , which verifies that massive MIMO is robust against passive attacks while it is seriously threatened  ... 
doi:10.1109/access.2019.2914028 fatcat:7kbwuzk37bdihjraxlds2jfwby

Physical layer security for massive MIMO: An overview on passive eavesdropping and active attacks

Dzevdan Kapetanovic, Gan Zheng, Fredrik Rusek
2015 IEEE Communications Magazine  
Specifically, we first show that MaMIMO itself is robust against passive eavesdropping attacks. We then review a pilot contamination scheme which actively attacks the channel estimation process.  ...  This article discusses opportunities and challenges of physical layer security integration in massive multiple-input multiple-output (MaMIMO) systems.  ...  Another advantage of MaMIMO, yet not widely recognized, is that the potential of physical layer security (PLS) against passive eavesdropping attacks is increased dramatically.  ... 
doi:10.1109/mcom.2015.7120012 fatcat:c7elorlclzcvzfrgc2scxzbdga

Exploiting Inter-User Interference for Secure Massive Non-Orthogonal Multiple Access [article]

Xiaoming Chen, Zhaoyang Zhang, Caijung Zhong, Derrick Wing Kwan Ng, Rundong Jia
2018 arXiv   pre-print
This paper considers the security issue of the fifth-generation (5G) wireless networks with massive connections, where multiple eavesdroppers aim to intercept the confidential messages through active eavesdropping  ...  In particular, we reveal the impact of some key system parameters on the ergodic secrecy rate via asymptotic analysis with respect to a large number of antennas and a high transmit power at the base station  ...  However, in secure massive NOMA systems based on TDD mode, there also exists several challenging issues in CSI acquisition.  ... 
arXiv:1802.07926v1 fatcat:ezjzfkcitjc7lcrrdpnwfbbvxa

An Investigation of Using Loop-back Mechanism for Channel Reciprocity Enhancement in Secret Key Generation

Linning Peng, Guyue Li, Junqing Zhang, Roger Woods, Ming Liu, Aiqun Hu
2018 IEEE Transactions on Mobile Computing  
The scheme is evaluated to be robust to passive eavesdropping and active Man-in-the-Middle attack through both theoretical analyses and practical measurements.  ...  His research interests are in wireless network technology and physical layer security of wireless communications.  ...  Through an extensive evaluation against passive eavesdropping and active MitM attack, the LB-TDD scheme was shown to be very secure and robust.  ... 
doi:10.1109/tmc.2018.2842215 fatcat:fk5wmnirlfdzlmt7wp63tozd24

Secret Key Generation Scheme Based on Deep Learning in FDD MIMO Systems

Zheng WAN, Kaizhi HUANG, Lu CHEN
2021 IEICE transactions on information and systems  
security, secret key generation, deep learning, FDD MIMO systems  ...  In this paper, a deep learning-based secret key generation scheme is proposed for FDD multiple-input and multiple-output (MIMO) systems.  ...  Furthermore, loop-back mechanism-based SKG schemes have been proved to be insecure because eavesdroppers can passively eavesdrop on confidential information through the attack strategy proposed in [6]  ... 
doi:10.1587/transinf.2020edl8145 fatcat:sto3ffv65nawdhvlryfjemqjiq

Physical Layer Security for 5G Wireless Networks: A Comprehensive Survey

José David Vega Sánchez, Luis Urquiza-Aguiar, Martha Cecilia Paredes Paredes
2019 Zenodo  
networks, and full-duplex, including the key concepts of each of the aforementioned technologies.  ...  The main idea of physical layer security is to take advantage of the features of the wireless channel and its impairments in order to ensure secure communication in the physical layer.  ...  Next, we survey the current security attacks of massive MIMO technology based on passive and active eavesdropper scenarios, respectively. Fig. 2 .  ... 
doi:10.5281/zenodo.3532040 fatcat:lct4ai7lf5hzpmepwqwv6e72t4

Physical Layer Security in Massive MIMO [article]

Y. Ozan Basciftci, C. Emre Koksal, Alexei Ashikhmin
2016 arXiv   pre-print
We show that massive MIMO communication is naturally resilient to no training-phase jamming attack in which the adversary jams only the data communication and eavesdrops both the data communication and  ...  Specifically, we consider an attack, called training-phase jamming in which the adversary jams and eavesdrops both the training and the data communication.  ...  We next show the vulnerability of massive MIMO systems against the attack, called training-phase jamming in which the adversary jams and eavesdrops both the training and data communication.  ... 
arXiv:1505.00396v2 fatcat:6oev4wb2vrd5le7a5fqttrgj2q

A Semiblind Two-Way Training Method for Discriminatory Channel Estimation in MIMO Systems

Junjie Yang, Shengli Xie, Xiangyun Zhou, Rong Yu, Yan Zhang
2014 IEEE Transactions on Communications  
approach and achieves better DCE performance; 2) the proposed scheme is robust against active eavesdropping with the pilot contamination attack, whereas the existing scheme fails under such an attack.  ...  In this paper, we propose a new two-way training scheme for DCE through exploiting a whitening-rotation (WR) based semiblind method.  ...  The two-way DCE scheme in [18] works well against passive eavesdropping attack from the UR.  ... 
doi:10.1109/tcomm.2014.2326394 fatcat:uo6p26zxjng7de32fepsd7zrwe

A New Frontier for IoT Security Emerging From Three Decades of Key Generation Relying on Wireless Channels

Junqing Zhang, Guyue Li, Alan Marshall, Aiqun Hu, Lajos Hanzo
2020 IEEE Access  
Cryptography does not achieve perfect secrecy, but it is capable of securing the information against attacks by using complex mathematical manipulations.  ...  Substantial research efforts have been invested into evaluating key generation security against passive eavesdropping both by simulation and experimental studies [74] , [258] - [262] . He et al.  ... 
doi:10.1109/access.2020.3012006 fatcat:yqlhgsxfjvdwvfo2jcvxxzhj2i

Safeguarding MTC at the Physical Layer: Potentials and Challenges

D. P. Moya Osorio, E. E. Benitez Olivo, H. Alves, M. Latva-aho
2020 IEEE Access  
However, as the definition and implementation of 5G networks are in progress, many security challenges arise.  ...  Thus, special emphasis will be given in the coming years to provide security and privacy for 5G and beyond networks.  ...  Indeed, in some MTC scenarios, massive MIMO techniques might be applied in order to serve several users simultaneously, so that great benefits in terms of security against passive and active attacks can  ... 
doi:10.1109/access.2020.2996383 fatcat:espxiyuqnfgcvgw2yxy4p24vxy

Exploiting Jamming Attacks for Energy Harvesting in Massive MIMO Systems

Hayder Al-Hraishawi, Symeon Chatzinotas, Bjorn Ottersten
2021 ICC 2021 - IEEE International Conference on Communications  
Our analysis reveals that the massive MIMO systems can make use of RF signals of the jamming attacks for boosting the amount of harvested energy at the served users.  ...  In this paper, the performance of an RF energy harvesting scheme for multi-user massive multiple-input multipleoutput (MIMO) is investigated in the presence of multiple active jammers.  ...  For instance, reference [14] investigates an AN-aided transmitter for secure communications in the presence of attackers capable of both jamming and eavesdropping.  ... 
doi:10.1109/icc42927.2021.9500422 fatcat:hyzyvjopujaylbqogyj3ioch4u
« Previous Showing results 1 — 15 out of 68 results