Skip to main content
main-content

Tipp

Weitere Artikel dieser Ausgabe durch Wischen aufrufen

Erschienen in: Wireless Personal Communications 3/2021

06.04.2019

Shifted 2-N-PSK Method for the Detection of Pilot Contamination Attacks

verfasst von: Dimitriya Mihaylova, Zlatka Valkova-Jarvis, Georgi Iliev, Vladimir Poulkov

Erschienen in: Wireless Personal Communications | Ausgabe 3/2021

Einloggen, um Zugang zu erhalten
share
TEILEN

Abstract

One major security problem at the physical layer of a wireless system is its vulnerability to pilot contamination attacks. A potential method for the detection of such active attacks involves training with two N-PSK pilots which however suffers from operational problems. In this paper we propose and evaluate the Shifted 2-N-PSK technique as an improvement on the original method. The Shifted 2-N-PSK method operates with two pilots from different constellations, each of which is shifted from the original N-PSK constellation. The performance of three variations of Shifted 2-N-PSK is presented and the most effective implementation of the technique is revealed to be when neither the shift values nor the difference between them equal an N-PSK angle. Experimental results are also provided, in order to confirm the theoretical estimates. In addition, a detailed analysis of the shift values and the number of their optimal combinations are presented for different accuracies.
Literatur
1.
Zurück zum Zitat Pecorella, T., Brilli, L., & Mucchi, L. (2016). The role of physical layer security in IoT: A novel perspective. Information, 7(49), 1–17. Pecorella, T., Brilli, L., & Mucchi, L. (2016). The role of physical layer security in IoT: A novel perspective. Information, 7(49), 1–17.
2.
Zurück zum Zitat Trappe, W., Howard, R., & Moore, R. S. (2015). Low-energy security: Limits and opportunities in the internet of things. IEEE Security and Privacy, 13(1), 14–21. CrossRef Trappe, W., Howard, R., & Moore, R. S. (2015). Low-energy security: Limits and opportunities in the internet of things. IEEE Security and Privacy, 13(1), 14–21. CrossRef
3.
Zurück zum Zitat Yang, N., Wang, L., Geraci, G., Elkashlan, M., Yuan, J., & Renzo, M. D. (2015). Safeguarding 5G wireless communication networks using physical layer security. IEEE Communications Magazine, 53(4), 20–27. CrossRef Yang, N., Wang, L., Geraci, G., Elkashlan, M., Yuan, J., & Renzo, M. D. (2015). Safeguarding 5G wireless communication networks using physical layer security. IEEE Communications Magazine, 53(4), 20–27. CrossRef
4.
Zurück zum Zitat Munisankaraiah, S., Kumar, A. (2016). Physical layer security in 5G wireless networks for data protection. In 2016 2nd International conference on next generation computing technologies ( NGCT), Dehradun, India, (pp. 14–16). Munisankaraiah, S., Kumar, A. (2016). Physical layer security in 5G wireless networks for data protection. In 2016 2nd International conference on next generation computing technologies ( NGCT), Dehradun, India, (pp. 14–16).
5.
Zurück zum Zitat Zeng, K. (2015). Physical layer key generation in wireless networks: Challenges and opportunities. IEEE Communications Magazine, 53(6), 33–39. CrossRef Zeng, K. (2015). Physical layer key generation in wireless networks: Challenges and opportunities. IEEE Communications Magazine, 53(6), 33–39. CrossRef
6.
Zurück zum Zitat Trappe, W. (2015). The challenges facing physical layer security. IEEE Communications Magazine, 53(6), 16–20. CrossRef Trappe, W. (2015). The challenges facing physical layer security. IEEE Communications Magazine, 53(6), 16–20. CrossRef
7.
Zurück zum Zitat Zhou, X., Maham, B., & Hjorungnes, A. (2012). Pilot contamination for active eavesdropping. IEEE Transactions on Wireless Communications, 11(3), 903–907. CrossRef Zhou, X., Maham, B., & Hjorungnes, A. (2012). Pilot contamination for active eavesdropping. IEEE Transactions on Wireless Communications, 11(3), 903–907. CrossRef
8.
Zurück zum Zitat Mihaylova, D., Valkova-Jarvis, Z., Iliev, G., & Poulkov, V. (2017). Shifted constellation-based detection of pilot contamination attacks. Global wireless summit (GWS) 2017, Cape Town, South Africa, 15–18. Mihaylova, D., Valkova-Jarvis, Z., Iliev, G., & Poulkov, V. (2017). Shifted constellation-based detection of pilot contamination attacks. Global wireless summit (GWS) 2017, Cape Town, South Africa, 15–18.
9.
Zurück zum Zitat Kapetanovic, D., Zheng, G., Wong, K.-K., & Ottersten, B. (2013). Detection of pilot contamination attack using random training and massive MIMO. In Proceedings of the IEEE International Symposium (PIMRC), (pp. 13–18). Kapetanovic, D., Zheng, G., Wong, K.-K., & Ottersten, B. (2013). Detection of pilot contamination attack using random training and massive MIMO. In Proceedings of the IEEE International Symposium (PIMRC), (pp. 13–18).
10.
Zurück zum Zitat Rusek, F., Persson, D., Lau, B. K., Larsson, E. G., Marzetta, T. L., Edfors, O., et al. (2013). Scaling up MIMO: Opportunities and challenges with very large arrays. IEEE Signal Processing Magazine, 30(1), 40–60. CrossRef Rusek, F., Persson, D., Lau, B. K., Larsson, E. G., Marzetta, T. L., Edfors, O., et al. (2013). Scaling up MIMO: Opportunities and challenges with very large arrays. IEEE Signal Processing Magazine, 30(1), 40–60. CrossRef
11.
Zurück zum Zitat Shiu, Y.-S., Chang, S. Y., Wu, H.-C., Huang, S.-H., & Chen, H.-H. (2011). Physical layer security in wireless networks: A tutorial. IEEE Wireless Communications Magazine, 18(2), 66–74. CrossRef Shiu, Y.-S., Chang, S. Y., Wu, H.-C., Huang, S.-H., & Chen, H.-H. (2011). Physical layer security in wireless networks: A tutorial. IEEE Wireless Communications Magazine, 18(2), 66–74. CrossRef
13.
Zurück zum Zitat Poor, H. V., & Schaefer, R. F. (2017). Wireless physical layer security. Proceeding of National Academy of Sciences of the United States of America (PNAS), 114(1), 19–26. CrossRef Poor, H. V., & Schaefer, R. F. (2017). Wireless physical layer security. Proceeding of National Academy of Sciences of the United States of America (PNAS), 114(1), 19–26. CrossRef
14.
Zurück zum Zitat Sodagari, S., & Clancy, T. C. (2015). On singularity attacks in MIMO channels. Transactions on Emerging Telecommunication Technologies, 26(3), 482–490. CrossRef Sodagari, S., & Clancy, T. C. (2015). On singularity attacks in MIMO channels. Transactions on Emerging Telecommunication Technologies, 26(3), 482–490. CrossRef
15.
Zurück zum Zitat Kapetanovic, D., Zheng, G., & Rusek, F. (2015). Physical layer security for massive MIMO: An overview on passive eavesdropping and active attacks. IEEE Communications Magazine, 53(6), 21–27. CrossRef Kapetanovic, D., Zheng, G., & Rusek, F. (2015). Physical layer security for massive MIMO: An overview on passive eavesdropping and active attacks. IEEE Communications Magazine, 53(6), 21–27. CrossRef
16.
Zurück zum Zitat Kapetanovic, D., Al-Nahari, A., Stojanovic, A., & Rusek, F. (2014). Detection of active eavesdroppers in massive MIMO. In Proceedings of the IEEE International Symposium. PIMRC (pp. 585–589). Kapetanovic, D., Al-Nahari, A., Stojanovic, A., & Rusek, F. (2014). Detection of active eavesdroppers in massive MIMO. In Proceedings of the IEEE International Symposium. PIMRC (pp. 585–589).
17.
Zurück zum Zitat Mihaylova, D., Iliev, G., Valkova-Jarvis, Z. (2017). Comparison of methods for the detection of pilot contamination attacks. In First international balkan conference on communications and networking ( BalkanCom 2017), Tirana, Albania, 30 May–2. Mihaylova, D., Iliev, G., Valkova-Jarvis, Z. (2017). Comparison of methods for the detection of pilot contamination attacks. In First international balkan conference on communications and networking ( BalkanCom 2017), Tirana, Albania, 30 May–2.
18.
Zurück zum Zitat Castaneda, M., Ivrlac, M., Nossek, J., Viering, I., & Klein, A. (2007). On downlink intercell interference in a cellular system. Proceedings of the IEEE international symposium on personal, indoor and mobile radio communications ( PIMRC). Castaneda, M., Ivrlac, M., Nossek, J., Viering, I., & Klein, A. (2007). On downlink intercell interference in a cellular system. Proceedings of the IEEE international symposium on personal, indoor and mobile radio communications ( PIMRC).
19.
Zurück zum Zitat Viering, I., Klein, A., Ivrlaˇc, M., Casta˜neda, M., & Nossek, J. A. (2006). On uplink intercell interference in a cellular system. In IEEE Interntational Conference on Communications ICC 2006, Istanbul, Turkey. Viering, I., Klein, A., Ivrlaˇc, M., Casta˜neda, M., & Nossek, J. A. (2006). On uplink intercell interference in a cellular system. In IEEE Interntational Conference on Communications ICC 2006, Istanbul, Turkey.
20.
Zurück zum Zitat Iliev, G., Nikolova, Z., Poulkov, V., & Ovtcharov, M. (2010). Narrowband interference suppression for MIMO MB-OFDM UWB communication systems. International Journal on Advances in Telecommunications, 3(1, 2), 1–8. Iliev, G., Nikolova, Z., Poulkov, V., & Ovtcharov, M. (2010). Narrowband interference suppression for MIMO MB-OFDM UWB communication systems. International Journal on Advances in Telecommunications, 3(1, 2), 1–8.
21.
Zurück zum Zitat Nikolova, Z., Iliev, G., Ovtcharov, M., & Poulkov, V. (2009). Narrowband interference suppression in wireless ofdm systems. African Journal of Information and Communication Technology, 5(1), 30–42. CrossRef Nikolova, Z., Iliev, G., Ovtcharov, M., & Poulkov, V. (2009). Narrowband interference suppression in wireless ofdm systems. African Journal of Information and Communication Technology, 5(1), 30–42. CrossRef
22.
Zurück zum Zitat Iliev G., Ovtcharov, M., Poulkov, V., & Nikolova, Z. (2009). Narrowband interference suppression for MIMO OFDM system using adaptive filter banks. In The 5th international wireless communications and mobile computing conference - IWCMC 2009 MIMO systems symposium, Leipzig, Germany, (pp. 874–877). Iliev G., Ovtcharov, M., Poulkov, V., & Nikolova, Z. (2009). Narrowband interference suppression for MIMO OFDM system using adaptive filter banks. In The 5th international wireless communications and mobile computing conference - IWCMC 2009 MIMO systems symposium, Leipzig, Germany, (pp. 874–877).
23.
Zurück zum Zitat Marzetta, T. L. (2010). Non-cooperative cellular wireless with unlimited numbers of base station antennas. IEEE Transactions on Wireless Communications, 9(11), 3590–3600. CrossRef Marzetta, T. L. (2010). Non-cooperative cellular wireless with unlimited numbers of base station antennas. IEEE Transactions on Wireless Communications, 9(11), 3590–3600. CrossRef
24.
Zurück zum Zitat Elijah, O., Leow, C. Y., Rahman, T. A., Nunoo, S., & Iliya, S. Z. (2016). A comprehensive survey of pilot contamination in massive MIMO-5G system. IEEE Commun. Surveys Tuts., 18(2), 905–923. CrossRef Elijah, O., Leow, C. Y., Rahman, T. A., Nunoo, S., & Iliya, S. Z. (2016). A comprehensive survey of pilot contamination in massive MIMO-5G system. IEEE Commun. Surveys Tuts., 18(2), 905–923. CrossRef
25.
Zurück zum Zitat Mihaylova, D., Valkova-Jarvis, Z., & Iliev, G. (2017). A new technique to improve the 2-N-PSK method for detecting wireless pilot contamination attacks. WSEAS Transmission Communication, 16, 176–183. Mihaylova, D., Valkova-Jarvis, Z., & Iliev, G. (2017). A new technique to improve the 2-N-PSK method for detecting wireless pilot contamination attacks. WSEAS Transmission Communication, 16, 176–183.
26.
Zurück zum Zitat Mihaylova, D., Valkova-Jarvis, Z., & Iliev, G. (2017). Detection capabilities of a shifted constellation-based method against pilot contamination attacks. Advances in Wireless and Optical Communications 2017 (RTUWO’17), Riga, Latvia, (pp. 2–3). Mihaylova, D., Valkova-Jarvis, Z., & Iliev, G. (2017). Detection capabilities of a shifted constellation-based method against pilot contamination attacks. Advances in Wireless and Optical Communications 2017 (RTUWO’17), Riga, Latvia, (pp. 2–3).
27.
Zurück zum Zitat Mihaylova, D., Valkova-Jarvis, Z., & Iliev, G. (2017). An improved technique for the detection of pilot contamination attacks in TDD wireless communication systems. In 21st international conference on circuits, systems, communications and computers ( CSCC 2017), Crete, Greece (pp. 14–17). Mihaylova, D., Valkova-Jarvis, Z., & Iliev, G. (2017). An improved technique for the detection of pilot contamination attacks in TDD wireless communication systems. In 21st international conference on circuits, systems, communications and computers ( CSCC 2017), Crete, Greece (pp. 14–17).
28.
Zurück zum Zitat Tabassum, H., Yilmaz, F., Dawy, Z., & Alouini, M.-S. (2013). A framework for uplink intercell interference modeling with channel-based scheduling. IEEE Transactions on Wireless Communications, 12(1), 206–217. CrossRef Tabassum, H., Yilmaz, F., Dawy, Z., & Alouini, M.-S. (2013). A framework for uplink intercell interference modeling with channel-based scheduling. IEEE Transactions on Wireless Communications, 12(1), 206–217. CrossRef
29.
Zurück zum Zitat Novlan, T., Dhillon, H., & Andrews, J. (2013). Analytical modeling of uplink cellular networks. IEEE Transactions on Wireless Communications, 12(6), 2669–2679. CrossRef Novlan, T., Dhillon, H., & Andrews, J. (2013). Analytical modeling of uplink cellular networks. IEEE Transactions on Wireless Communications, 12(6), 2669–2679. CrossRef
Metadaten
Titel
Shifted 2-N-PSK Method for the Detection of Pilot Contamination Attacks
verfasst von
Dimitriya Mihaylova
Zlatka Valkova-Jarvis
Georgi Iliev
Vladimir Poulkov
Publikationsdatum
06.04.2019
Verlag
Springer US
Erschienen in
Wireless Personal Communications / Ausgabe 3/2021
Print ISSN: 0929-6212
Elektronische ISSN: 1572-834X
DOI
https://doi.org/10.1007/s11277-019-06341-x

Weitere Artikel der Ausgabe 3/2021

Wireless Personal Communications 3/2021 Zur Ausgabe