Robustness of secret key agreement protocol with massive MIMO under pilot contamination attack

We consider a secret key agreement (SKA) protocol over time division duplex for a massive Multiple-Input-Multiple-Output (MIMO) system. As a security threat, we assume that a pilot contamination attack (PCA) is attempted by an eavesdropper for the purpose to gain information about the secret key. The eavesdropper controls its transmit power for the PCA in a way to maximize the amount of eavesdropping information, while hiding her presence from legitimate users. To fend off this PCA, we consider a SKA protocol working with a PCA detector. Specifically, our SKA protocol suspends the key generation process to prevent information leakage to the eavesdropper if the PCA detector declares the presence of the PCA more than a certain number of times. Taking into account the best choice of the PCA power for the eavesdropper, we analyze an achievable length of generated secret key through our SKA protocol. Simulation results show that our SKA protocol effectively suppresses the eavesdropper's PCA power by adjusting a threshold determining the suspension of the PCA, and a positive length of secret key is achievable through our SKA protocol.

[1]  Thomas L. Marzetta,et al.  Pilot Contamination and Precoding in Multi-Cell TDD Systems , 2009, IEEE Transactions on Wireless Communications.

[2]  Thomas L. Marzetta,et al.  Noncooperative Cellular Wireless with Unlimited Numbers of Base Station Antennas , 2010, IEEE Transactions on Wireless Communications.

[3]  Ueli Maurer,et al.  Linking information reconciliation and privacy amplification , 1997, Journal of Cryptology.

[4]  H. Vincent Poor,et al.  An introduction to signal detection and estimation (2nd ed.) , 1994 .

[5]  U. Maurer,et al.  Secret key agreement by public discussion from common information , 1993, IEEE Trans. Inf. Theory.

[6]  Jon W. Wallace,et al.  Automatic Secret Keys From Reciprocal MIMO Wireless Channels: Measurement and Analysis , 2010, IEEE Transactions on Information Forensics and Security.

[7]  Yehuda Lindell,et al.  Introduction to Modern Cryptography , 2004 .

[8]  Erik G. Larsson,et al.  Energy and Spectral Efficiency of Very Large Multiuser MIMO Systems , 2011, IEEE Transactions on Communications.

[9]  Theodore S. Rappaport,et al.  Wireless communications - principles and practice , 1996 .

[10]  Wade Trappe,et al.  Information-Theoretically Secret Key Generation for Fading Wireless Channels , 2009, IEEE Transactions on Information Forensics and Security.

[11]  Xiangyun Zhou,et al.  Pilot Contamination for Active Eavesdropping , 2012, IEEE Transactions on Wireless Communications.

[12]  Matthieu R. Bloch,et al.  Wireless Information-Theoretic Security , 2008, IEEE Transactions on Information Theory.

[13]  Jinho Choi,et al.  Secret key agreement under an active attack in MU-TDD systems with large antenna arrays , 2013, 2013 IEEE Global Communications Conference (GLOBECOM).

[14]  Rudolf Ahlswede,et al.  Common randomness in information theory and cryptography - I: Secret sharing , 1993, IEEE Trans. Inf. Theory.