Detection of Pilot Contamination Attack in Massive MIMO System

In this work, we present low complexity method to detect pilot contamination attack (PCA) by eavesdropper (Eve) on legitimate user (LU) in massive MIMO (MaMIMO) systems. In PCA, Eve transmits pilot signal in synchronization with LU to steer partial beam towards Eve. Consequently, significant information leaks to the Eve during downlink transmission causing security breach. The knowledge of active Eve can significantly improve secrecy capacity of the LU. We also provide analysis of probability of detection, probability of false alarm and probability of detection error. The simulation results demonstrate efficacy of the proposed method to detect PCA.

[1]  Qi Xiong,et al.  Achieving Secrecy of MISO Fading Wiretap Channels via Jamming and Precoding With Imperfect Channel State Information , 2014, IEEE Wireless Communications Letters.

[2]  Qi Xiong,et al.  An Energy-Ratio-Based Approach for Detecting Pilot Spoofing Attack in Multiple-Antenna Systems , 2015, IEEE Transactions on Information Forensics and Security.

[3]  Caijun Zhong,et al.  Pilot Contamination Attack Detection Using Random Symbols for Massive MIMO Systems , 2017, 2017 IEEE 85th Vehicular Technology Conference (VTC Spring).

[4]  Matthew R. McKay,et al.  Secure Transmission With Artificial Noise Over Fading Channels: Achievable Rate and Optimal Power Allocation , 2010, IEEE Transactions on Vehicular Technology.

[5]  A. D. Wyner,et al.  The wire-tap channel , 1975, The Bell System Technical Journal.

[6]  Xiangyun Zhou,et al.  Pilot Contamination for Active Eavesdropping , 2012, IEEE Transactions on Wireless Communications.

[7]  Jitendra K. Tugnait Detection and Identification of Spoofed Pilots in TDD/SDMA Systems , 2017, IEEE Wireless Communications Letters.

[8]  Erik G. Larsson,et al.  Massive MIMO for next generation wireless systems , 2013, IEEE Communications Magazine.

[9]  Derrick Wing Kwan Ng,et al.  Secure Massive MIMO Transmission With an Active Eavesdropper , 2015, IEEE Transactions on Information Theory.

[10]  Hai Su,et al.  Secret key generation exploiting channel characteristics in wireless communications , 2011, IEEE Wireless Communications.

[11]  Björn E. Ottersten,et al.  Detection of pilot contamination attack using random training and massive MIMO , 2013, 2013 IEEE 24th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC).