A New Technique to Improve the 2-N-PSK Method for Detecting Wireless Pilot Contamination Attacks
نویسندگان
چکیده
Wireless communication systems are very vulnerable to pilot contamination attacks, which represents a major physical layer security issue. Hence, it is necessary to apply different approaches and methods to the detection of this type of attack. One effective method proposed in the literature is 2-N-PSK pilot detection, which consists of training with two random N-PSK pilots. Although the method is broadly effective, it is not able to detect an attack initiated during the transmission of the second pilot of the pair in the case when both the legitimate and non-legitimate pilots coincide. In this paper, an improvement to this method is proposed to detect an intrusion which misses the first pilot transmission and initiates an attack during the second training period. This improved technique is based on channel gain comparison and eliminates the need to use threshold values in the detection – a drawback of previously-existing solutions. Key-Words: Wireless communication systems, Physical layer security, Pilot contamination attacks, 2-N-PSK pilot detection method, Channel state information, Detection statistic.
منابع مشابه
A Lightweight Intrusion Detection System Based on Specifications to Improve Security in Wireless Sensor Networks
Due to the prevalence of Wireless Sensor Networks (WSNs) in the many mission-critical applications such as military areas, security has been considered as one of the essential parameters in Quality of Service (QoS), and Intrusion Detection System (IDS) is considered as a fundamental requirement for security in these networks. This paper presents a lightweight Intrusion Detection System to prote...
متن کاملA New Intrusion Detection System to deal with Black Hole Attacks in Mobile Ad Hoc Networks
By extending wireless networks and because of their different nature, some attacks appear in these networks which did not exist in wired networks. Security is a serious challenge for actual implementation in wireless networks. Due to lack of the fixed infrastructure and also because of security holes in routing protocols in mobile ad hoc networks, these networks are not protected against attack...
متن کاملEvaluation of an Intrusion Detection System for Routing Attacks in Wireless Self-organised Networks
Wireless Sensor Networks (WSNs) arebecoming increasingly popular, and very useful in militaryapplications and environmental monitoring. However,security is a major challenge for WSNs because they areusually setup in unprotected environments. Our goal in thisstudy is to simulate an Intrusion Detection System (IDS)that monitors the WSN and report intrusions accurately andeffectively. We have thus...
متن کاملA Secure Routing Algorithm for Underwater Wireless Sensor Networks
Recently, underwater Wireless Sensor Networks (UWSNs) attracted the interest of many researchers and the past three decades have held the rapid progress of underwater acoustic communication. One of the major problems in UWSNs is how to transfer data from the mobile node to the base stations and choosing the optimized route for data transmission. Secure routing in UWSNs is necessary for packet d...
متن کاملA New Method for Clustering Wireless Sensor Networks to Improve the Energy Consumption
Clustering is an effective approach for managing nodes in Wireless Sensor Network (WSN). A new method of clustering mechanism with using Binary Gravitational Search Algorithm (BGSA) in WSN, is proposed in this paper to improve the energy consumption of the sensor nodes. Reducing the energy consumption of sensors in WSNs is the objective of this paper that is through selecting the sub optimum se...
متن کامل