An Energy-Ratio-Based Approach for Detecting Pilot Spoofing Attack in Multiple-Antenna Systems

The pilot spoofing attack is one kind of active eavesdropping conducted by a malicious user during the channel estimation phase of the legitimate transmission. In this attack, an intelligent adversary spoofs the transmitter on the estimation of channel state information (CSI) by sending the identical pilot signal as the legitimate receiver, in order to obtain a larger information rate in the data transmission phase. The pilot spoofing attack could also drastically weaken the strength of the received signal at the legitimate receiver if the adversary utilizes large enough power. Motivated by the serious problems the pilot spoofing attack could cause, we propose an efficient detector, named energy ratio detector (ERD), by exploring the asymmetry of received signal power levels at the transmitter and the legitimate receiver when there exists a pilot spoofing attack. Our analysis shows that by setting the ratio of received signal power levels at the transmitter and the legitimate receiver as the test statistic, the detecting threshold is derived without using the knowledge of the CSI of the legitimate channel as well as the illegitimate channel. Furthermore, we study the performance of the proposed ERD in various special cases in order to obtain useful insights. Numerical results are presented to further demonstrate the performance of our proposed ERD.

[1]  Rohit Negi,et al.  Guaranteeing Secrecy using Artificial Noise , 2008, IEEE Transactions on Wireless Communications.

[2]  J. Sobana,et al.  Detection and Localization of Multiple Spoofing Attackers in Wireless Networks , 2014 .

[3]  Imre Csiszár,et al.  Broadcast channels with confidential messages , 1978, IEEE Trans. Inf. Theory.

[4]  Xiangyun Zhou,et al.  Pilot Contamination for Active Eavesdropping , 2012, IEEE Transactions on Wireless Communications.

[5]  Zhu Han,et al.  On the impact of network-state knowledge on the Feasibility of secrecy , 2013, 2013 IEEE International Symposium on Information Theory.

[6]  A. D. Wyner,et al.  The wire-tap channel , 1975, The Bell System Technical Journal.

[7]  Xianbin Wang,et al.  Robust physical layer authentication using inherent properties of channel impulse response , 2011, 2011 - MILCOM 2011 Military Communications Conference.

[8]  Wade Trappe,et al.  Detecting Spoofing and Anomalous Traffic in Wireless Networks via Forge-Resistant Relationships , 2007, IEEE Transactions on Information Forensics and Security.

[9]  Erik G. Larsson,et al.  Scaling Up MIMO: Opportunities and Challenges with Very Large Arrays , 2012, IEEE Signal Process. Mag..

[10]  Björn E. Ottersten,et al.  Detection of pilot contamination attack using random training and massive MIMO , 2013, 2013 IEEE 24th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC).

[11]  Andrey Garnaev,et al.  The eavesdropping and Jamming Dilemma in multi-channel communications , 2013, 2013 IEEE International Conference on Communications (ICC).

[12]  Xiangyun Zhou,et al.  A Semiblind Two-Way Training Method for Discriminatory Channel Estimation in MIMO Systems , 2014, IEEE Transactions on Communications.

[13]  William Stallings,et al.  Cryptography and Network Security: Principles and Practice , 1998 .

[14]  Larry J. Greenstein,et al.  Channel-Based Detection of Sybil Attacks in Wireless Networks , 2009, IEEE Transactions on Information Forensics and Security.

[15]  Qi Xiong,et al.  Achieving Secrecy of MISO Fading Wiretap Channels via Jamming and Precoding With Imperfect Channel State Information , 2014, IEEE Wireless Communications Letters.

[16]  Athina P. Petropulu,et al.  Ergodic Secrecy Rate for Multiple-Antenna Wiretap Channels With Rician Fading , 2011, IEEE Transactions on Information Forensics and Security.

[17]  William Stallings,et al.  Cryptography and network security - principles and practice (3. ed.) , 2014 .

[18]  Gregory W. Wornell,et al.  Secure Transmission With Multiple Antennas—Part II: The MIMOME Wiretap Channel , 2010, IEEE Transactions on Information Theory.

[19]  Larry J. Greenstein,et al.  Channel-based spoofing detection in frequency-selective rayleigh channels , 2009, IEEE Transactions on Wireless Communications.

[20]  D. Hinkley On the ratio of two correlated normal random variables , 1969 .

[21]  Yonghong Zeng,et al.  Sensing-Throughput Tradeoff for Cognitive Radio Networks , 2008, IEEE Trans. Wirel. Commun..

[22]  Sennur Ulukus,et al.  Achievable Rates in Gaussian MISO Channels with Secrecy Constraints , 2007, 2007 IEEE International Symposium on Information Theory.

[23]  Larry J. Greenstein,et al.  PHY-Authentication Protocol for Spoofing Detection in Wireless Networks , 2010, 2010 IEEE Global Telecommunications Conference GLOBECOM 2010.