Random-Training-Assisted Pilot Spoofing Detection and Secure Transmission

نویسندگان

  • Xiaowen Tian
  • Ming Li
  • Qian Liu
چکیده

The pilot spoofing attack is considered as an active eavesdropping activity launched by an adversary during the reverse channel training phase. By transmitting the same pilot signal as the legitimate user, the pilot spoofing attack is able to degrade the quality of legitimate transmission and, more severely, facilitate eavesdropping. In an effort to detect the pilot spoofing attack and minimize its damages, in this paper we propose a novel random-training-assisted (RTA) pilot spoofing detection algorithm. In particular, we develop a new training mechanism by adding a random training phase after the conventional pilot training phase. By examining the difference of the estimated legitimate channels during these two phases, the pilot spoofing attack can be detected accurately. If no spoofing attack is detected, we present a computationally efficient channel estimation enhancement algorithm to further improve the channel estimation accuracy. If the existence of the pilot spoofing attack is identified, a zero-forcing (ZF)-based secure transmission scheme is proposed to protect the confidential information from the active eavesdropper. Extensive simulation results demonstrate that the proposed RTA scheme can achieve efficient pilot spoofing detection, accurate channel estimation, and secure transmission.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Multi_path Based Training Protection Approach against Pilot Spoofing Attacks

The Pilot spoofing attack can be defined as an attack in which the quite active eavesdropping activities are conducted by a malicious user throughout the channel coaching section. They transmit the identical pilot i.e. training signals as those of the legal users, these are like associate degree attacks. Such attack is ready to govern the channel estimation outcome. This can also lead to a bigg...

متن کامل

Secure Packet Transmission Against Pilot Spoofing and Phishing Attack

The pilot spoofing attack is one kind of active eavesdropping activities conducted by a malicious user during the channel training phase. By transmitting the identical pilot (training) signals as those of the legal users, such an attack is able to manipulate the channel estimation outcome, which may result in a larger channel rate for the adversary but a smaller channel rate for the legitimate ...

متن کامل

Multiple Antennas Secure Transmission under Pilot Spoofing and Jamming Attack

Transmitter-side channel state information (CSI) of the legitimate destination plays a critical role in physical layer secure transmissions. However, channel training procedure is vulnerable to the pilot spoofing attack (PSA) or pilot jamming attack (PJA) by an active eavesdropper (Eve), which inevitably results in severe private information leakage. In this paper, we propose a random channel t...

متن کامل

A New Technique to Improve the 2-N-PSK Method for Detecting Wireless Pilot Contamination Attacks

Wireless communication systems are very vulnerable to pilot contamination attacks, which represents a major physical layer security issue. Hence, it is necessary to apply different approaches and methods to the detection of this type of attack. One effective method proposed in the literature is 2-N-PSK pilot detection, which consists of training with two random N-PSK pilots. Although the method...

متن کامل

Enhanced Tiny Encryption Algorithm with Embedding (ETEA)

As computer systems become more pervasive and complex, security is increasingly important. Secure Transmission refers to the transfer of data such as confidential or proprietary information over a secure channel. Many secure transmission methods require a type of encryption. Secure transmissions are put in place to prevent attacks such as ARP spoofing and general data loss. Hence, in order to p...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • CoRR

دوره abs/1609.00225  شماره 

صفحات  -

تاریخ انتشار 2016