Detection and Localization of the Eavesdropper in MIMO Systems
The pilot spoofing attack (PSA) is one kind of active eavesdropping that happens in the channel training phase, in which an intelligent eavesdropper transmits identical pilot sequences synchronously with the legitimate user to spoof the transmitter. This attack leads to the estimated channel being a...
Main Authors: | , , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
IEEE
2020-01-01
|
Series: | IEEE Access |
Subjects: | |
Online Access: | https://ieeexplore.ieee.org/document/9097435/ |
id |
doaj-3c16787df37c44b8b0a27b7460f0d622 |
---|---|
record_format |
Article |
spelling |
doaj-3c16787df37c44b8b0a27b7460f0d6222021-03-30T03:00:00ZengIEEEIEEE Access2169-35362020-01-018949849499310.1109/ACCESS.2020.29954029097435Detection and Localization of the Eavesdropper in MIMO SystemsLina Ning0https://orcid.org/0000-0002-0978-4409Bin Li1https://orcid.org/0000-0002-1998-819XChenglin Zhao2Yiwen Tao3Xiang Wang4School of Information and Communication Engineering, Beijing University of Posts and Telecommunications, Beijing, ChinaSchool of Information and Communication Engineering, Beijing University of Posts and Telecommunications, Beijing, ChinaSchool of Information and Communication Engineering, Beijing University of Posts and Telecommunications, Beijing, ChinaSchool of Information and Communication Engineering, Beijing University of Posts and Telecommunications, Beijing, ChinaBeijing Jianyi Corporation, Ltd., Beijing, ChinaThe pilot spoofing attack (PSA) is one kind of active eavesdropping that happens in the channel training phase, in which an intelligent eavesdropper transmits identical pilot sequences synchronously with the legitimate user to spoof the transmitter. This attack leads to the estimated channel being a mix of a legitimate channel (the channel from the transmitter to the legitimate user) and an eavesdropper channel (the channel from the transmitter to the eavesdropper). And as a result, confidential information is leaked to the eavesdropper during the data transmission phase. Especially when the eavesdropper utilizes sufficiently large power, the channel rate at the legitimate user end decreases observably and increases dramatically at the eavesdropper. To against the active PSA, we propose a new effective scheme called the spatial spectrum method (SSM) which can be applied in situations in which the eavesdropper attacks not only the transmitter but also the legitimate user in multiple-input multiple-output (MIMO) communication systems. Specifically, this method utilizes the spatial spectrums that are attained by the uplink training phase to detect the eavesdropper. Besides it also can locate the legitimate user and the eavesdropper by identifying the direction-of-arrival (DOA) of the legitimate user and the eavesdropper based on the symmetry of the uplink and downlink channels in a time-division-duplex (TDD) system and estimating the geographical distance between the legitimate user and the eavesdropper. Consequently, the secure transmission of secret information can be guaranteed by utilizing spatial information, such as by adopting beamforming technology. Numerical results show that our method can effectively detect and locate the eavesdropper.https://ieeexplore.ieee.org/document/9097435/Physical layer securityspatial spectrum methodpilot spoofing attackmultiple-input and multiple-output |
collection |
DOAJ |
language |
English |
format |
Article |
sources |
DOAJ |
author |
Lina Ning Bin Li Chenglin Zhao Yiwen Tao Xiang Wang |
spellingShingle |
Lina Ning Bin Li Chenglin Zhao Yiwen Tao Xiang Wang Detection and Localization of the Eavesdropper in MIMO Systems IEEE Access Physical layer security spatial spectrum method pilot spoofing attack multiple-input and multiple-output |
author_facet |
Lina Ning Bin Li Chenglin Zhao Yiwen Tao Xiang Wang |
author_sort |
Lina Ning |
title |
Detection and Localization of the Eavesdropper in MIMO Systems |
title_short |
Detection and Localization of the Eavesdropper in MIMO Systems |
title_full |
Detection and Localization of the Eavesdropper in MIMO Systems |
title_fullStr |
Detection and Localization of the Eavesdropper in MIMO Systems |
title_full_unstemmed |
Detection and Localization of the Eavesdropper in MIMO Systems |
title_sort |
detection and localization of the eavesdropper in mimo systems |
publisher |
IEEE |
series |
IEEE Access |
issn |
2169-3536 |
publishDate |
2020-01-01 |
description |
The pilot spoofing attack (PSA) is one kind of active eavesdropping that happens in the channel training phase, in which an intelligent eavesdropper transmits identical pilot sequences synchronously with the legitimate user to spoof the transmitter. This attack leads to the estimated channel being a mix of a legitimate channel (the channel from the transmitter to the legitimate user) and an eavesdropper channel (the channel from the transmitter to the eavesdropper). And as a result, confidential information is leaked to the eavesdropper during the data transmission phase. Especially when the eavesdropper utilizes sufficiently large power, the channel rate at the legitimate user end decreases observably and increases dramatically at the eavesdropper. To against the active PSA, we propose a new effective scheme called the spatial spectrum method (SSM) which can be applied in situations in which the eavesdropper attacks not only the transmitter but also the legitimate user in multiple-input multiple-output (MIMO) communication systems. Specifically, this method utilizes the spatial spectrums that are attained by the uplink training phase to detect the eavesdropper. Besides it also can locate the legitimate user and the eavesdropper by identifying the direction-of-arrival (DOA) of the legitimate user and the eavesdropper based on the symmetry of the uplink and downlink channels in a time-division-duplex (TDD) system and estimating the geographical distance between the legitimate user and the eavesdropper. Consequently, the secure transmission of secret information can be guaranteed by utilizing spatial information, such as by adopting beamforming technology. Numerical results show that our method can effectively detect and locate the eavesdropper. |
topic |
Physical layer security spatial spectrum method pilot spoofing attack multiple-input and multiple-output |
url |
https://ieeexplore.ieee.org/document/9097435/ |
work_keys_str_mv |
AT linaning detectionandlocalizationoftheeavesdropperinmimosystems AT binli detectionandlocalizationoftheeavesdropperinmimosystems AT chenglinzhao detectionandlocalizationoftheeavesdropperinmimosystems AT yiwentao detectionandlocalizationoftheeavesdropperinmimosystems AT xiangwang detectionandlocalizationoftheeavesdropperinmimosystems |
_version_ |
1724184176087793664 |