An Energy-Ratio-Based Approach for Detecting Pilot Spoofing Attack in Multiple-Antenna Systems
- 15 January 2015
- journal article
- Published by Institute of Electrical and Electronics Engineers (IEEE) in IEEE Transactions on Information Forensics and Security
- Vol. 10 (5), 932-940
- https://doi.org/10.1109/tifs.2015.2392564
Abstract
The pilot spoofing attack is one kind of active eavesdropping conducted by a malicious user during the channel estimation phase of the legitimate transmission. In this attack, an intelligent adversary spoofs the transmitter on the estimation of channel state information (CSI) by sending the identical pilot signal as the legitimate receiver, in order to obtain a larger information rate in the data transmission phase. The pilot spoofing attack could also drastically weaken the strength of the received signal at the legitimate receiver if the adversary utilizes large enough power. Motivated by the serious problems the pilot spoofing attack could cause, we propose an efficient detector, named energy ratio detector (ERD), by exploring the asymmetry of received signal power levels at the transmitter and the legitimate receiver when there exists a pilot spoofing attack. Our analysis shows that by setting the ratio of received signal power levels at the transmitter and the legitimate receiver as the test statistic, the detecting threshold is derived without using the knowledge of the CSI of the legitimate channel as well as the illegitimate channel. Furthermore, we study the performance of the proposed ERD in various special cases in order to obtain useful insights. Numerical results are presented to further demonstrate the performance of our proposed ERD.Keywords
This publication has 21 references indexed in Scilit:
- A Semiblind Two-Way Training Method for Discriminatory Channel Estimation in MIMO SystemsIEEE Transactions on Communications, 2014
- Detection of pilot contamination attack using random training and massive MIMOPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2013
- On the impact of network-state knowledge on the Feasibility of secrecyPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2013
- The eavesdropping and Jamming Dilemma in multi-channel communicationsPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2013
- Detection and Localization of Multiple Spoofing Attackers in Wireless NetworksIEEE Transactions on Parallel and Distributed Systems, 2012
- Pilot Contamination for Active EavesdroppingIEEE Transactions on Wireless Communications, 2012
- Robust physical layer authentication using inherent properties of channel impulse responsePublished by Institute of Electrical and Electronics Engineers (IEEE) ,2011
- PHY-Authentication Protocol for Spoofing Detection in Wireless NetworksPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2010
- Channel-Based Detection of Sybil Attacks in Wireless NetworksIEEE Transactions on Information Forensics and Security, 2009
- Detecting Spoofing and Anomalous Traffic in Wireless Networks via Forge-Resistant RelationshipsIEEE Transactions on Information Forensics and Security, 2007