Mitigation of Pilot Spoofing Attack in Frequency Selective Channels

In a time-division duplex (TDD) multiple antenna system, the channel state information (CSI) can be estimated using reverse training. A pilot contamination (spoofing) attack occurs when during the training phase, an adversary also sends identical training (pilot) signal as that of the legitimate receiver. This contaminates channel estimation and alters the legitimate beamforming design, facilitating eavesdropping. Most of past approaches to pilot spoofing detection are limited to flat fading channels. A recent approach proposed superimposing a random sequence on the training sequence at the legitimate receiver for detection of pilot spoofing attack over frequency selective channels, with unknown channels and channel lengths, except that an upper bound on the number of channel taps is assumed to be known. In this paper we augment this approach with joint estimation of both legitimate receiver and eavesdropper channels, and secure time-reversal precoding, to mitigate the effects of pilot spoofing. The proposed mitigation approach is illustrated via simulations.

[1]  Jitendra K. Tugnait Detection of Pilot Spoofing Attack Over Frequency Selective Channels , 2018, 2018 IEEE Statistical Signal Processing Workshop (SSP).

[2]  Mohammad Reza Aref,et al.  Statistical Performance Analysis of MDL Source Enumeration in Array Processing , 2010, IEEE Transactions on Signal Processing.

[3]  Arogyaswami Paulraj,et al.  Application of time-reversal with MMSE equalizer to UWB communications , 2004, IEEE Global Telecommunications Conference, 2004. GLOBECOM '04..

[4]  Boaz Nadler,et al.  Non-Parametric Detection of the Number of Signals: Hypothesis Testing and Random Matrix Theory , 2009, IEEE Transactions on Signal Processing.

[5]  Qi Xiong,et al.  Secure Transmission Against Pilot Spoofing Attack: A Two-Way Training-Based Scheme , 2016, IEEE Transactions on Information Forensics and Security.

[6]  Jitendra K. Tugnait DETECTION OF PILOT CONTAMINATION ATTACK IN T , 2016 .

[7]  Robert W. Heath,et al.  Equal gain transmission in multiple-input multiple-output wireless systems , 2002, Global Telecommunications Conference, 2002. GLOBECOM '02. IEEE.

[8]  Boaz Nadler,et al.  Nonparametric Detection of Signals by Information Theoretic Criteria: Performance Analysis and an Improved Estimator , 2010, IEEE Transactions on Signal Processing.

[9]  Thomas Kailath,et al.  Detection of signals by information theoretic criteria , 1985, IEEE Trans. Acoust. Speech Signal Process..

[10]  Fredrik Rusek,et al.  Physical layer security for massive MIMO: An overview on passive eavesdropping and active attacks , 2015, IEEE Communications Magazine.

[11]  Xiangyun Zhou,et al.  Pilot Contamination for Active Eavesdropping , 2012, IEEE Transactions on Wireless Communications.

[12]  Wade Trappe,et al.  On the Vulnerabilities of CSI in MIMO Wireless Communication Systems , 2012, IEEE Transactions on Mobile Computing.

[13]  Jitendra K. Tugnait,et al.  Pilot Spoofing Attack Detection and Countermeasure , 2018, IEEE Transactions on Communications.

[14]  Jitendra K. Tugnait,et al.  On mitigation of pilot spoofing attack , 2017, 2017 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).

[15]  Karim Abed-Meraim,et al.  Fast Adaptive Blind MMSE Equalizer for Multichannel FIR Systems , 2006, EURASIP J. Adv. Signal Process..

[16]  Jitendra K. Tugnait,et al.  Self-Contamination for Detection of Pilot Contamination Attack in Multiple Antenna Systems , 2015, IEEE Wireless Communications Letters.

[17]  B. Nadler,et al.  Determining the number of components in a factor model from limited noisy data , 2008 .