Full-Duplex Cyber-Weapon With Massive Arrays

In order to enhance secrecy performance of protecting scenarios, understanding the illegitimate side is crucial. In this paper, from the perspective of the illegitimate side, the security attack from a full-duplex cyber-weapon equipped with massive antenna arrays is considered. To evaluate the behavior of the proposed cyber-weapon, we develop a closed-form, a tight approximation, and asymptotic expressions of the achievable ergodic secrecy rate with taking into consideration imperfect channel estimation at the cyber-weapon. The results show that even under some disadvantage conditions, i.e., imperfect channel estimation and self-interference, the full-duplex massive array cyber-weapon can disable traditional physical layer protecting schemes, i.e., increasing the transmit power and the number of antennas at the legitimate transmitter. In addition, when a transmit power optimization scheme for maximizing the difference between the eavesdropping rate and the legitimate rate is applied at the full-duplex cyber-weapon, the malicious attack is even more dangerous. The results also reveal that when the legitimate side faces an advance adversary, it is essential to prevent important information in the training phases exposing to the illegitimate side.

[1]  Erik G. Larsson,et al.  Massive MU-MIMO downlink TDD systems with linear precoding and downlink pilots , 2013, 2013 51st Annual Allerton Conference on Communication, Control, and Computing (Allerton).

[2]  Victor C. M. Leung,et al.  Securing Uplink Transmission for Lightweight Single-Antenna UEs in the Presence of a Massive MIMO Eavesdropper , 2016, IEEE Access.

[3]  Erik G. Larsson,et al.  Single-User Beamforming in Large-Scale MISO Systems with Per-Antenna Constant-Envelope Constraints: The Doughnut Channel , 2011, IEEE Transactions on Wireless Communications.

[4]  Erik G. Larsson,et al.  Massive MIMO as a cyber-weapon , 2014, 2014 48th Asilomar Conference on Signals, Systems and Computers.

[5]  I. S. Gradshteyn,et al.  Table of Integrals, Series, and Products , 1976 .

[6]  Theodore S. Rappaport,et al.  Wireless communications - principles and practice , 1996 .

[7]  Jie Xu,et al.  Proactive Eavesdropping Via Jamming for Rate Maximization Over Rayleigh Fading Channels , 2015, IEEE Wireless Communications Letters.

[8]  Erik G. Larsson,et al.  Massive MIMO for next generation wireless systems , 2013, IEEE Communications Magazine.

[9]  H. Vincent Poor,et al.  Security Enhancement of Cooperative Single Carrier Systems , 2015, IEEE Transactions on Information Forensics and Security.

[10]  Vijay K. Bhargava,et al.  Secure Transmission in Multicell Massive MIMO Systems , 2014, IEEE Transactions on Wireless Communications.

[11]  Tho Le-Ngoc,et al.  Physical layer security in wireless cooperative relay networks: state of the art and beyond , 2015, IEEE Communications Magazine.

[12]  Qi Xiong,et al.  An Energy-Ratio-Based Approach for Detecting Pilot Spoofing Attack in Multiple-Antenna Systems , 2015, IEEE Transactions on Information Forensics and Security.

[13]  Xiaoming Chen,et al.  Secure Transmission in Wireless Powered Massive MIMO Relaying Systems: Performance Analysis and Optimization , 2016, IEEE Transactions on Vehicular Technology.

[14]  Gerard J. Foschini,et al.  Layered space-time architecture for wireless communication in a fading environment when using multi-element antennas , 1996, Bell Labs Technical Journal.

[15]  Erik G. Larsson,et al.  Energy and Spectral Efficiency of Very Large Multiuser MIMO Systems , 2011, IEEE Transactions on Communications.

[16]  Zhu Han,et al.  Combating Full-Duplex Active Eavesdropper: A Hierarchical Game Perspective , 2017, IEEE Transactions on Communications.

[17]  Vijay K. Bhargava,et al.  Linear Precoding of Data and Artificial Noise in Secure Massive MIMO Systems , 2015, IEEE Transactions on Wireless Communications.

[18]  A. Lee Swindlehurst,et al.  A full-duplex active eavesdropper in mimo wiretap channels: Construction and countermeasures , 2011, 2011 Conference Record of the Forty Fifth Asilomar Conference on Signals, Systems and Computers (ASILOMAR).

[19]  George T. Amariucai,et al.  Half-Duplex Active Eavesdropping in Fast-Fading Channels: A Block-Markov Wyner Secrecy Encoding Scheme , 2012, IEEE Transactions on Information Theory.

[20]  George K. Karagiannidis,et al.  Full-duplex spectrum sharing in cooperative single carrier systems , 2015, WCNC.

[21]  Kamel Tourki,et al.  Probabilistic Jamming/Eavesdropping Attacks to Confuse a Buffer-Aided Transmitter–Receiver Pair , 2017, IEEE Communications Letters.

[22]  Wei Xu,et al.  Securing Massive MIMO Via Power Scaling , 2016, IEEE Communications Letters.

[23]  Tobias J. Oechtering,et al.  Massive MIMO Pilot Retransmission Strategies for Robustification Against Jamming , 2017, IEEE Wireless Communications Letters.

[24]  H. Vincent Poor,et al.  Information and inference in the wireless physical layer , 2012, IEEE Wireless Communications.

[25]  Xiangyun Zhou,et al.  Pilot Contamination for Active Eavesdropping , 2012, IEEE Transactions on Wireless Communications.

[26]  Derrick Wing Kwan Ng,et al.  Energy-Efficient Resource Allocation in OFDMA Systems with Large Numbers of Base Station Antennas , 2012, IEEE Transactions on Wireless Communications.

[27]  Hien Quoc Ngo,et al.  Secure full-duplex small-cell networks in a spectrum sharing environment , 2016, IEEE Access.

[28]  Derrick Wing Kwan Ng,et al.  Secure Massive MIMO Transmission With an Active Eavesdropper , 2015, IEEE Transactions on Information Theory.

[29]  Emre Telatar,et al.  Capacity of Multi-antenna Gaussian Channels , 1999, Eur. Trans. Telecommun..

[30]  Fredrik Rusek,et al.  Physical layer security for massive MIMO: An overview on passive eavesdropping and active attacks , 2015, IEEE Communications Magazine.

[31]  Hien Quoc Ngo,et al.  Secure 5G Wireless Communications: A Joint Relay Selection and Wireless Power Transfer Approach , 2016, IEEE Access.