Intelligent Reflecting Surface Aided Pilot Contamination Attack and Its Countermeasure
نویسندگان
چکیده
Pilot contamination attack (PCA) in a time division duplex wireless communication system is considered, where an eavesdropper (Eve) attacks the reverse pilot transmission phase order to wiretap data transmitted from transmitter, Alice, receiver, Bob. We propose new PCA scheme for Eve, wherein Eve does not emit any signal by itself but uses intelligent reflecting surface (IRS) reflect sent Bob Alice. The proposed scheme, referred as IRS-PCA, increases leakage Alice IRS during phase, which then reflected improve wiretapping capability of Eve. IRS-PCA disables many existing countermeasures on due fact that with no longer needs know sequence Bob, and therefore, poses severe threat security legitimate system. In view this, problems 1) detection 2) secure under are considered this paper. For detection, generalized cumulative sum (GCUSUM) procedure based framework quickest aiming at detecting occurrence soon possible once it occurs. cooperative channel estimation estimate IRS, zero-forcing beamforming designed reduce leakage.
منابع مشابه
Performance Analysis of cooperative SWIPT System: Intelligent Reflecting Surface versus Decode-and-Forward
In this paper, we explore the impacts of utilizing intelligent reflecting surfaces (IRS) in a power-splitting based simultaneous wireless information and power transfer (PS-SWIPT) system and compare its performance with the traditional decode and forward relaying system. To analyze a more practical system, it is also assumed that the receiving nodes are subject to decoding cost, and they are on...
متن کاملFrequency of occurrence analysis attack and its countermeasure
This paper addresses a newly discovered security threat named Frequency of Occurrence Analysis (FOA) attack in searchmetics password authentication scheme. A countermeasure technique that utilises Metaheuristic Randomisation Algorithm (MRA) is proposed to address the FOA attack. The proposed Algorithm is presented and an offline FOA attack simulation tool is developed to verify the effectivenes...
متن کاملMan-in-the-Middle Attack and its Countermeasure in Bluetooth Secure Simple Pairing
With the development of more types of devices which have bluetooth as a primary option to communicate, the importance of secure communication is growing. Bluetooth provides a short range wireless communication between devices making convenient for users and thus eliminating the need for messy cables. The proliferation of the Bluetooth devices in the workplace exposes organizations to security r...
متن کاملIntelligent Computer-Aided Engineering
The goal of Intelligent Computer-Aided Engineering (ICAE) is to construct computer programs which capture a signi cant fraction of an engineer's knowledge. Today ICAE systems are a goal, not a reality. This paper attempts to re ne that goal and suggest how to get there. We begin by examining several scenarios of what ICAE systems could be like. Next we describe why ICAE won't directly evolve fr...
متن کاملAttack countermeasure trees (ACT): towards unifying the constructs of attack and defense trees
Attack tree (AT) is one of the widely used non-state-space models for security analysis. The basic formalism of AT does not take into account defense mechanisms. Defense trees (DTs) have been developed to investigate the effect of defense mechanisms using measures such as attack cost, security investment cost, return on attack (ROA) and return on investment (ROI). DT, however, places defense me...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IEEE Transactions on Wireless Communications
سال: 2021
ISSN: ['1536-1276', '1558-2248']
DOI: https://doi.org/10.1109/twc.2020.3024808