Skip to main content
Erschienen in: Wireless Personal Communications 3/2018

29.12.2017

Proactive Eavesdropping via Pilot Contamination and Jamming

verfasst von: Linqing Wan, Guangchi Zhang, Miao Cui, Fan Lin

Erschienen in: Wireless Personal Communications | Ausgabe 3/2018

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Proactive eavesdropping is a new paradigm shift in wireless physical layer security from preventing conventional eavesdropping attacks to legitimate intercepting suspicious communications, which has attracted a lot of attention recently. Pilot contamination is one effective technique in proactive eavesdropping, which spoofs the suspicious transmitter on channel estimation by sending the same pilot signal as the suspicious receiver, and lets it leak information in the direction of the legitimate eavesdropper during its transmission. However, this technique may fail when an anti-pilot-contamination mechanism called “energy ratio detector (ERD)” is applied at the suspicious receiver. To deal with the case that the suspicious receiver is a smart device using ERD, in this paper, we study using pilot contamination along with jamming to improve the legitimate eavesdropping performance. We first derive a closed-form expression for the probability of pilot contamination being detected by the suspicious receiver, and use it to obtain a closed-form expression for the eavesdropping rate. Using this theoretical analysis result, we propose an algorithm to maximize the eavesdropping rate by jointly optimizing the pilot contamination power and jamming power via two-dimensional search. Simulation results show that the proposed eavesdropping rate maximization algorithm can significantly improve eavesdropping rate, as compared to other benchmark schemes.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Zhang, G., Xu, J., Wu, Q., Cui, M., Li, X., & Lin, F. Wireless powered cooperative jamming for secure OFDM system. In IEEE transactions on vehicular technology. to appear. Zhang, G., Xu, J., Wu, Q., Cui, M., Li, X., & Lin, F. Wireless powered cooperative jamming for secure OFDM system. In IEEE transactions on vehicular technology. to appear.
2.
Zurück zum Zitat Zhang, Q., Huang, X., Li, Q., & Qin, J. (2015). Cooperative jamming aided robust secure transmission for wireless information and power transfer in MISO channels. IEEE Transactions on Communications, 63(3), 906–915.CrossRef Zhang, Q., Huang, X., Li, Q., & Qin, J. (2015). Cooperative jamming aided robust secure transmission for wireless information and power transfer in MISO channels. IEEE Transactions on Communications, 63(3), 906–915.CrossRef
3.
Zurück zum Zitat Li, Q., Zhang, Q., & Qin, J. (2016). Secure relay beamforming for SWIPT in amplify-and-forward two-way relay networks. IEEE Transactions on Vehicular Technology, 65(11), 9006–9019.CrossRef Li, Q., Zhang, Q., & Qin, J. (2016). Secure relay beamforming for SWIPT in amplify-and-forward two-way relay networks. IEEE Transactions on Vehicular Technology, 65(11), 9006–9019.CrossRef
4.
Zurück zum Zitat Zou, Y., Zhu, J., Wang, X., & Hanzo, L. (2016). A survey on wireless security: Technical challenges, recent advances and future trends. Proceedings of the IEEE, 104(9), 1727–1756.CrossRef Zou, Y., Zhu, J., Wang, X., & Hanzo, L. (2016). A survey on wireless security: Technical challenges, recent advances and future trends. Proceedings of the IEEE, 104(9), 1727–1756.CrossRef
5.
Zurück zum Zitat Zhu, F., Gao, F., Yao, M., & Zou, H. (2014). Joint information- and jamming- beamforming for physical layer security with full duplex base station. IEEE Transactions on Signal Processing, 62(24), 6391–6401.MathSciNetCrossRef Zhu, F., Gao, F., Yao, M., & Zou, H. (2014). Joint information- and jamming- beamforming for physical layer security with full duplex base station. IEEE Transactions on Signal Processing, 62(24), 6391–6401.MathSciNetCrossRef
6.
Zurück zum Zitat Wang, H.-M., Zheng, T., & Xia, X.-G. (2015). Secure MISO wiretap channels with multi-antenna passive eavesdropper: Artificial noise versus artificial fast fading. IEEE Transactions on Wireless Communications, 14(1), 94–106.CrossRef Wang, H.-M., Zheng, T., & Xia, X.-G. (2015). Secure MISO wiretap channels with multi-antenna passive eavesdropper: Artificial noise versus artificial fast fading. IEEE Transactions on Wireless Communications, 14(1), 94–106.CrossRef
7.
Zurück zum Zitat Amariucai, G. T., & Wei, S. (2012). Half-duplex active eavesdropping in fast-fading channels: A block-Markov Wyner secrecy encoding scheme. IEEE Transactions on Information Theory, 58(7), 4660–4677.MathSciNetCrossRefMATH Amariucai, G. T., & Wei, S. (2012). Half-duplex active eavesdropping in fast-fading channels: A block-Markov Wyner secrecy encoding scheme. IEEE Transactions on Information Theory, 58(7), 4660–4677.MathSciNetCrossRefMATH
8.
Zurück zum Zitat Basciftci, Y. O., Gungor, O., Koksal, C. E., & Ozguner, F. (2015). On the secrecy capacity of block fading channels with a hybrid adversary. IEEE Transactions on Information Theory, 61(3), 1325–1343.MathSciNetCrossRefMATH Basciftci, Y. O., Gungor, O., Koksal, C. E., & Ozguner, F. (2015). On the secrecy capacity of block fading channels with a hybrid adversary. IEEE Transactions on Information Theory, 61(3), 1325–1343.MathSciNetCrossRefMATH
9.
Zurück zum Zitat Mukherjee, A., & Swindlehurst, A. L. (2013). Jamming games in the MIMO wiretap channel with an active eavesdropper. IEEE Transactions on Signal Processing, 61(1), 82–91.MathSciNetCrossRef Mukherjee, A., & Swindlehurst, A. L. (2013). Jamming games in the MIMO wiretap channel with an active eavesdropper. IEEE Transactions on Signal Processing, 61(1), 82–91.MathSciNetCrossRef
10.
Zurück zum Zitat Mukherjee, A., & Swindlehurst, A. L. (2011). A full-duplex active eavesdropper in MIMO wiretap channels: Construction and countermeasures. In Proceedings of the IEEE ASILOMAR (pp. 265–269). Mukherjee, A., & Swindlehurst, A. L. (2011). A full-duplex active eavesdropper in MIMO wiretap channels: Construction and countermeasures. In Proceedings of the IEEE ASILOMAR (pp. 265–269).
11.
Zurück zum Zitat Kapetanovic, D., Zheng, G., & Rusek, F. (2015). Physical layer security formassive MIMO: An overview on passive eavesdropping and active attacks. IEEE Communications Magazine, 53(6), 21–27.CrossRef Kapetanovic, D., Zheng, G., & Rusek, F. (2015). Physical layer security formassive MIMO: An overview on passive eavesdropping and active attacks. IEEE Communications Magazine, 53(6), 21–27.CrossRef
12.
Zurück zum Zitat Zhou, X., Maham, B., & Hjorungnes, A. (2012). Pilot contamination for active eavesdropping. IEEE Transactions on Wireless Communications, 11(3), 903–907.CrossRef Zhou, X., Maham, B., & Hjorungnes, A. (2012). Pilot contamination for active eavesdropping. IEEE Transactions on Wireless Communications, 11(3), 903–907.CrossRef
13.
Zurück zum Zitat Xiong, Q., Liang, Y.-C., Li, K. H., & Gong, Y. (2015). An energy-ratio-based approach for detecting pilot spoofing attack in multiple-antenna systems. IEEE Transactions on Information Forensics Security, 10(5), 932–940.CrossRef Xiong, Q., Liang, Y.-C., Li, K. H., & Gong, Y. (2015). An energy-ratio-based approach for detecting pilot spoofing attack in multiple-antenna systems. IEEE Transactions on Information Forensics Security, 10(5), 932–940.CrossRef
14.
Zurück zum Zitat Xu, J., Duan, L., & Zhang, R. (2016). Proactive eavesdropping via jamming for rate maximization over Rayleigh fading channels. IEEE Wireless Communications Letters, 5(1), 80–83.CrossRef Xu, J., Duan, L., & Zhang, R. (2016). Proactive eavesdropping via jamming for rate maximization over Rayleigh fading channels. IEEE Wireless Communications Letters, 5(1), 80–83.CrossRef
15.
Zurück zum Zitat Xu, J., Duan, L., & Zhang, R. (2016). Proactive eavesdropping via cognitive jamming in fading channels, Kuala Lumpur, Malaysia. In Proceedings of IEEE international conference on communications (pp. 1–6). Xu, J., Duan, L., & Zhang, R. (2016). Proactive eavesdropping via cognitive jamming in fading channels, Kuala Lumpur, Malaysia. In Proceedings of IEEE international conference on communications (pp. 1–6).
16.
Zurück zum Zitat Rodriguez, L. J., Tran, N. H., Duong, T. Q., Le-Ngoc, T., Shetty, S., & Elkashlan, M. (2015). Physical layer security for massive MIMO: An overview on passive eavesdropping and active attacks. IEEE Communications Magazine, 53(12), 32–39.CrossRef Rodriguez, L. J., Tran, N. H., Duong, T. Q., Le-Ngoc, T., Shetty, S., & Elkashlan, M. (2015). Physical layer security for massive MIMO: An overview on passive eavesdropping and active attacks. IEEE Communications Magazine, 53(12), 32–39.CrossRef
17.
Zurück zum Zitat Jose, J., Ashikhmin, A., Marzetta, T. L., & Vishwanath, S. (2011). Pilot contamination and precoding in multi-cell TDD systems. IEEE Transactions on Wireless Communications, 10(8), 2640–2651.CrossRef Jose, J., Ashikhmin, A., Marzetta, T. L., & Vishwanath, S. (2011). Pilot contamination and precoding in multi-cell TDD systems. IEEE Transactions on Wireless Communications, 10(8), 2640–2651.CrossRef
18.
Zurück zum Zitat Tugnait, J. K. (2016). Detection of pilot contamination attack in T.D.D./S.D.M.A. systems. In Proceedings of the international conference on acoustics, speech, and signal processing (ICASSP). Tugnait, J. K. (2016). Detection of pilot contamination attack in T.D.D./S.D.M.A. systems. In Proceedings of the international conference on acoustics, speech, and signal processing (ICASSP).
19.
Zurück zum Zitat Kapetanovi, D., Zheng, G., Wong, K.-K., & Ottersten, B. (2013). Detection of pilot contamination attack using random training and massive MIMO. In Proceedings of the PIMRC (pp. 13–18). Kapetanovi, D., Zheng, G., Wong, K.-K., & Ottersten, B. (2013). Detection of pilot contamination attack using random training and massive MIMO. In Proceedings of the PIMRC (pp. 13–18).
20.
Zurück zum Zitat Zeng, Y., & Zhang, R. (2016). Wireless information surveillance via proactive eavesdropping with spoofing relay. IEEE Journal of Selected Topics in Signal Processing, 10(8), 1449–1461.CrossRef Zeng, Y., & Zhang, R. (2016). Wireless information surveillance via proactive eavesdropping with spoofing relay. IEEE Journal of Selected Topics in Signal Processing, 10(8), 1449–1461.CrossRef
21.
Zurück zum Zitat Liang, Y.-C., Zeng, Y., Peh, E. C. Y., & Hoang, A. T. (2008). Sensing-throughput tradeoff for cognitive radio networks. IEEE Transactions on Wireless Communications, 7(4), 1326–1337.CrossRef Liang, Y.-C., Zeng, Y., Peh, E. C. Y., & Hoang, A. T. (2008). Sensing-throughput tradeoff for cognitive radio networks. IEEE Transactions on Wireless Communications, 7(4), 1326–1337.CrossRef
Metadaten
Titel
Proactive Eavesdropping via Pilot Contamination and Jamming
verfasst von
Linqing Wan
Guangchi Zhang
Miao Cui
Fan Lin
Publikationsdatum
29.12.2017
Verlag
Springer US
Erschienen in
Wireless Personal Communications / Ausgabe 3/2018
Print ISSN: 0929-6212
Elektronische ISSN: 1572-834X
DOI
https://doi.org/10.1007/s11277-017-5213-0

Weitere Artikel der Ausgabe 3/2018

Wireless Personal Communications 3/2018 Zur Ausgabe

Neuer Inhalt