Attacking Massive MIMO Cognitive Radio Networks by Optimized Jamming

Massive multiple-input multiple-output (MaMIMO) and cognitive radio networks (CRNs) are two promising technologies for improving spectral efficiency of next-generation wireless communication networks. In this paper, we investigate the problem of physical layer security in the networks that jointly use both technologies, named MaMIMO-CRN. Specifically, to investigate the vulnerability of this network, we design an optimized attacking scenario to MaMIMO-CRNs by a jammer. For having the most adversary effect on the uplink transmission of the legitimate MaMIMO-CRN, we propose an efficient method for power allocation of the jammer. The legitimate network consists of a training and a data transmission phase, and both of these phases are attacked by the jammer using an optimized power split between them. The resulting power allocation problem is non-convex. We thus propose three different efficient methods for solving this problem, and we show that under some assumptions, a closed-form solution can also be obtained. Our results show the vulnerability of the MaMIMO-CRN to an optimized jammer. It is also shown that increasing the number of antennas at the legitimate network does not improve the security of the network.

[1]  Danijela Cabric,et al.  QoS Aware Power Allocation and User Selection in Massive MIMO Underlay Cognitive Radio Networks , 2018, IEEE Transactions on Cognitive Communications and Networking.

[2]  Fredrik Rusek,et al.  Physical layer security for massive MIMO: An overview on passive eavesdropping and active attacks , 2015, IEEE Communications Magazine.

[3]  Mohammad Hossein Kahaei,et al.  Energy Efficiency of Massive MIMO Cognitive Radio Networks in Presence of Smart Jamming , 2019 .

[4]  Weiwei Yang,et al.  DCE-Based Secure Transmission for Massive MIMO Relay System Against Active Eavesdropper , 2020, IEEE Transactions on Vehicular Technology.

[5]  Hsiao-Hwa Chen,et al.  Physical Layer Security for Next Generation Wireless Networks: Theories, Technologies, and Challenges , 2017, IEEE Communications Surveys & Tutorials.

[6]  Weihua Zhuang,et al.  On Countermeasures of Pilot Spoofing Attack in Massive MIMO Systems: A Double Channel Training Based Approach , 2019, IEEE Transactions on Vehicular Technology.

[7]  Emil Björnson,et al.  Subverting Massive MIMO by Smart Jamming , 2015, IEEE Wireless Communications Letters.

[8]  Erik G. Larsson,et al.  Scaling Up MIMO: Opportunities and Challenges with Very Large Arrays , 2012, IEEE Signal Process. Mag..

[9]  Mohsen Guizani,et al.  Survey of Security Issues in Cognitive Radio Networks , 2011 .

[10]  Wei-Chiang Li,et al.  Convex Optimization for Signal Processing and Communications: From Fundamentals to Applications , 2017 .

[11]  Erik G. Larsson,et al.  Massive MIMO for next generation wireless systems , 2013, IEEE Communications Magazine.

[12]  Gayan Amarasuriya Aruma Baduge,et al.  Secure Communication in Underlay Cognitive Massive MIMO Systems with Pilot Contamination , 2017, GLOBECOM 2017 - 2017 IEEE Global Communications Conference.

[13]  Kang G. Shin,et al.  Cognitive radios for dynamic spectrum access: from concept to reality , 2010, IEEE Wireless Communications.

[14]  Gayan Amarasuriya Aruma Baduge,et al.  Sum Rate Analysis of Cognitive Massive MIMO Systems with Underlay Spectrum Sharing , 2016, 2016 IEEE Global Communications Conference (GLOBECOM).

[15]  Zhu Han,et al.  Combating Full-Duplex Active Eavesdropper: A Hierarchical Game Perspective , 2017, IEEE Transactions on Communications.

[16]  Emil Björnson,et al.  Jamming Detection in Massive MIMO Systems , 2017, IEEE Wireless Communications Letters.

[17]  Danda B. Rawat,et al.  Advances on Security Threats and Countermeasures for Cognitive Radio Networks: A Survey , 2015, IEEE Communications Surveys & Tutorials.

[18]  Ian F. Akyildiz,et al.  A survey on spectrum management in cognitive radio networks , 2008, IEEE Communications Magazine.

[19]  S. Kay Fundamentals of statistical signal processing: estimation theory , 1993 .

[20]  Emil Björnson,et al.  Jamming Suppression in Massive MIMO Systems , 2019, IEEE Transactions on Circuits and Systems II: Express Briefs.

[21]  Xiaojiang Du,et al.  Mitigation of the Spectrum Sensing Data Falsifying Attack in Cognitive Radio Networks , 2019, ICC 2019 - 2019 IEEE International Conference on Communications (ICC).

[22]  Rafael F. Schaefer,et al.  Secure Communication in Spectrum-Sharing Massive MIMO Systems With Active Eavesdropping , 2018, IEEE Transactions on Cognitive Communications and Networking.

[23]  Haji M. Furqan,et al.  Classifications and Applications of Physical Layer Security Techniques for Confidentiality: A Comprehensive Survey , 2019, IEEE Communications Surveys & Tutorials.

[24]  Shailesh Chaudhari,et al.  Interference Mitigation and Resource Allocation in Underlay Cognitive Radio Networks , 2019, ArXiv.

[25]  Emil Björnson,et al.  Jamming-Resistant Receivers for the Massive MIMO Uplink , 2017, IEEE Transactions on Information Forensics and Security.

[26]  Hien Quoc Ngo,et al.  Massive MIMO in Spectrum Sharing Networks: Achievable Rate and Power Efficiency , 2017, IEEE Systems Journal.

[27]  Hiroshi Furukawa,et al.  Power Allocation for Massive MIMO Cognitive Radio Networks With Pilot Sharing Under SINR Requirements of Primary Users , 2018, IEEE Transactions on Vehicular Technology.

[28]  Yide Wang,et al.  Energy-Efficient Joint Power Allocation in Uplink Massive MIMO Cognitive Radio Networks With Imperfect CSI , 2017, IEEE Access.

[29]  Erik G. Larsson,et al.  Energy and Spectral Efficiency of Very Large Multiuser MIMO Systems , 2011, IEEE Transactions on Communications.

[30]  Stephen J. Wright,et al.  Primal-Dual Interior-Point Methods , 1997 .

[31]  H. Vincent Poor,et al.  Worst-Case Jamming on MIMO Gaussian Channels , 2015, IEEE Transactions on Signal Processing.