Design and Performance Analysis of Channel Estimators Under Pilot Spoofing Attacks in Multiple-Antenna Systems

In multiple antenna systems employing time-division duplexing, spatial precoder design at the base station (BS) leverages channel state information acquired through uplink pilot transmission, under the assumption of channel reciprocity. Malicious eavesdroppers can start pilot spoofing attacks to alter such design, in order to improve their eavesdropping performance in downlink. The aim of this paper is to study the effects of pilot spoofing attacks on uplink channel estimation, by assuming that the BS knows the angle of arrivals (AoAs) of the legitimate channels. Specifically, after assessing the performance of the simple least squares estimator (LSE), we consider more sophisticated estimators, such as the maximum likelihood estimator (MLE) and different versions of the minimum mean square error estimator (MMSEE), involving different degrees of a priori information about the pilot spoofing attacks. Theoretical analysis and numerical simulations are used to compare the performance of such estimators. In particular, we analytically demonstrate that the spoofing effects in the high signal-to-noise ratio regime can be completely suppressed, under certain conditions involving the AoAs of the legitimate and spoofing channels. Moreover, we show that even an imperfect knowledge of the AoAs and of the average transmission power of the spoofing signals allows the MLE and MMSEE to achieve significant performance gains over the LSE.

[1]  Josef A. Nossek,et al.  Linear transmit processing in MIMO communications systems , 2005, IEEE Transactions on Signal Processing.

[2]  Björn E. Ottersten,et al.  Detection of pilot contamination attack using random training and massive MIMO , 2013, 2013 IEEE 24th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC).

[3]  Are Hjørungnes,et al.  Complex-Valued Matrix Differentiation: Techniques and Key Results , 2007, IEEE Transactions on Signal Processing.

[4]  N. L. Johnson,et al.  Continuous Univariate Distributions. , 1995 .

[5]  Vincent Fusco,et al.  Orthogonal Vector Approach for Synthesis of Multi-Beam Directional Modulation Transmitters , 2015, IEEE Antennas and Wireless Propagation Letters.

[6]  R. Michael Buehrer,et al.  BER performance of a uniform circular array versus a uniform linear array in a mobile radio environment , 2004, IEEE Transactions on Wireless Communications.

[7]  Theodoros A. Tsiftsis,et al.  Multiple Antennas Secure Transmission Under Pilot Spoofing and Jamming Attack , 2018, IEEE Journal on Selected Areas in Communications.

[8]  Thomas Kailath,et al.  ESPRIT-estimation of signal parameters via rotational invariance techniques , 1989, IEEE Trans. Acoust. Speech Signal Process..

[9]  Yiqiang Yu,et al.  Introduction to Direction-Of-Arrival Estimation , 2010 .

[10]  Sathish Chandran,et al.  Advances in Direction-of-Arrival Estimation , 2005 .

[11]  Petre Stoica,et al.  MUSIC, maximum likelihood, and Cramer-Rao bound , 1989, IEEE Transactions on Acoustics, Speech, and Signal Processing.

[12]  Can Emre Koksal,et al.  Securing massive MIMO at the physical layer , 2015, 2015 IEEE Conference on Communications and Network Security (CNS).

[13]  J.E. Mazo,et al.  Digital communications , 1985, Proceedings of the IEEE.

[14]  Andrea Goldsmith,et al.  Error statistics of real-time power measurements in cellular channels with multipath and shadowing , 1994 .

[15]  Alex B. Gershman,et al.  Training-based MIMO channel estimation: a study of estimator tradeoffs and optimal training signals , 2006, IEEE Transactions on Signal Processing.

[16]  Lang Tong,et al.  Optimal design and placement of pilot symbols for channel estimation , 2001, 2001 IEEE International Conference on Acoustics, Speech, and Signal Processing. Proceedings (Cat. No.01CH37221).

[17]  Charles R. Johnson,et al.  Topics in Matrix Analysis , 1991 .

[18]  Qi Xiong,et al.  An Energy-Ratio-Based Approach for Detecting Pilot Spoofing Attack in Multiple-Antenna Systems , 2015, IEEE Transactions on Information Forensics and Security.

[19]  Martin E. Hellman,et al.  The Gaussian wire-tap channel , 1978, IEEE Trans. Inf. Theory.

[20]  S. Kay Fundamentals of statistical signal processing: estimation theory , 1993 .

[21]  Jitendra K. Tugnait,et al.  Self-Contamination for Detection of Pilot Contamination Attack in Multiple Antenna Systems , 2015, IEEE Wireless Communications Letters.

[22]  Robert H. Halstead,et al.  Matrix Computations , 2011, Encyclopedia of Parallel Computing.

[23]  Jinho Choi,et al.  Secret Key Agreement With Large Antenna Arrays Under the Pilot Contamination Attack , 2015, IEEE Transactions on Wireless Communications.

[24]  Robert Schober,et al.  Pilot Spoofing Attack by Multiple Eavesdroppers , 2018, IEEE Transactions on Wireless Communications.

[25]  P. Uthansakul,et al.  Angular beamforming technique for MIMO beamforming system , 2012, 2012 9th International Conference on Electrical Engineering/Electronics, Computer, Telecommunications and Information Technology.

[26]  Harry L. Van Trees,et al.  Optimum Array Processing: Part IV of Detection, Estimation, and Modulation Theory , 2002 .

[27]  Robert L. Wolpert,et al.  Statistical Inference , 2019, Encyclopedia of Social Network Analysis and Mining.

[28]  Theodore S. Rappaport,et al.  Overview of spatial channel models for antenna array communication systems , 1998, IEEE Wirel. Commun..

[29]  Jitendra K. Tugnait,et al.  Pilot Spoofing Attack Detection and Countermeasure , 2018, IEEE Transactions on Communications.

[30]  I. Olkin,et al.  Inequalities: Theory of Majorization and Its Applications , 1980 .

[31]  Thomas Kailath,et al.  Detection of signals by information theoretic criteria , 1985, IEEE Trans. Acoust. Speech Signal Process..

[32]  M. J. Gans,et al.  On Limits of Wireless Communications in a Fading Environment when Using Multiple Antennas , 1998, Wirel. Pers. Commun..

[33]  Wade Trappe,et al.  On the Vulnerabilities of CSI in MIMO Wireless Communication Systems , 2012, IEEE Transactions on Mobile Computing.

[34]  T. Engin Tuncer,et al.  Classical and Modern Direction-of-Arrival Estimation , 2009 .

[35]  Jitendra K. Tugnait Detection and Identification of Spoofed Pilots in TDD/SDMA Systems , 2017, IEEE Wireless Communications Letters.

[36]  Charles R. Johnson,et al.  Matrix analysis , 1985, Statistical Inference for Engineers and Data Scientists.

[37]  Derrick Wing Kwan Ng,et al.  Secure Massive MIMO Transmission With an Active Eavesdropper , 2015, IEEE Transactions on Information Theory.

[38]  Emre Telatar,et al.  Capacity of Multi-antenna Gaussian Channels , 1999, Eur. Trans. Telecommun..

[39]  Gerard J. Foschini,et al.  Layered space-time architecture for wireless communication in a fading environment when using multi-element antennas , 1996, Bell Labs Technical Journal.

[40]  C. Emre Koksal,et al.  Physical Layer Security in Massive MIMO , 2015, 1505.00396.

[41]  Xiangyun Zhou,et al.  Pilot Contamination for Active Eavesdropping , 2012, IEEE Transactions on Wireless Communications.

[42]  Jian Li,et al.  Fully automatic computation of diagonal loading levels for robust adaptive beamforming , 2008, 2008 IEEE International Conference on Acoustics, Speech and Signal Processing.

[43]  John B. Shoven,et al.  I , Edinburgh Medical and Surgical Journal.

[44]  G. Casella,et al.  Statistical Inference , 2003, Encyclopedia of Social Network Analysis and Mining.

[45]  Qi Xiong,et al.  Secure Transmission Against Pilot Spoofing Attack: A Two-Way Training-Based Scheme , 2016, IEEE Transactions on Information Forensics and Security.

[46]  Weihua Zhuang,et al.  On Countermeasures of Pilot Spoofing Attack in Massive MIMO Systems: A Double Channel Training Based Approach , 2019, IEEE Transactions on Vehicular Technology.