Active eavesdropping via spoofing relay attack

This paper studies a new active eavesdropping technique via the so-called spoofing relay attack, which could be launched by the eavesdropper to significantly enhance the information leakage rate from the source over conventional passive eavesdropping. With this attack, the eavesdropper acts as a relay to spoof the source to vary transmission rate in favor of its eavesdropping performance by either enhancing or degrading the effective channel of the legitimate link. The maximum information leakage rate achievable by the eavesdropper and the corresponding optimal operation at the spoofing relay are obtained. It is shown that such a spoofing relay attack could impose new challenges from a physical-layer security perspective since it leads to significantly higher information leakage rate than conventional passive eavesdropping.

[1]  J. L. Massey,et al.  An introduction to contemporary cryptology , 1988, Proc. IEEE.

[2]  Björn E. Ottersten,et al.  Detection of pilot contamination attack using random training and massive MIMO , 2013, 2013 IEEE 24th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC).

[3]  Jae-Mo Kang,et al.  Detection of Pilot Contamination Attack for Multi-Antenna Based Secrecy Systems , 2015, 2015 IEEE 81st Vehicular Technology Conference (VTC Spring).

[4]  Fredrik Rusek,et al.  Detection of active eavesdroppers in massive MIMO , 2014, 2014 IEEE 25th Annual International Symposium on Personal, Indoor, and Mobile Radio Communication (PIMRC).

[5]  Risto Wichman,et al.  In-Band Full-Duplex Wireless: Challenges and Opportunities , 2013, IEEE Journal on Selected Areas in Communications.

[6]  Xiangyun Zhou,et al.  Pilot Contamination for Active Eavesdropping , 2012, IEEE Transactions on Wireless Communications.

[7]  Qi Xiong,et al.  An Energy-Ratio-Based Approach for Detecting Pilot Spoofing Attack in Multiple-Antenna Systems , 2015, IEEE Transactions on Information Forensics and Security.

[8]  Jitendra K. Tugnait,et al.  Self-Contamination for Detection of Pilot Contamination Attack in Multiple Antenna Systems , 2015, IEEE Wireless Communications Letters.

[9]  Gregory W. Wornell,et al.  Secure Transmission With Multiple Antennas I: The MISOME Wiretap Channel , 2010, IEEE Transactions on Information Theory.

[10]  Shlomo Shamai,et al.  Information Theoretic Security , 2009, Found. Trends Commun. Inf. Theory.

[11]  Frédérique E. Oggier,et al.  The secrecy capacity of the MIMO wiretap channel , 2008, ISIT.

[12]  Fredrik Rusek,et al.  Physical layer security for massive MIMO: An overview on passive eavesdropping and active attacks , 2015, IEEE Communications Magazine.

[13]  C.-C. Jay Kuo,et al.  Enhancing Physical-Layer Secrecy in Multiantenna Wireless Systems: An Overview of Signal Processing Approaches , 2013, IEEE Signal Processing Magazine.

[14]  A. D. Wyner,et al.  The wire-tap channel , 1975, The Bell System Technical Journal.