Design and Performance Analysis of Channel Estimators Under Pilot Spoofing Attacks in Multiple-Antenna Systems
暂无分享,去创建一个
[1] Josef A. Nossek,et al. Linear transmit processing in MIMO communications systems , 2005, IEEE Transactions on Signal Processing.
[2] Björn E. Ottersten,et al. Detection of pilot contamination attack using random training and massive MIMO , 2013, 2013 IEEE 24th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC).
[3] Are Hjørungnes,et al. Complex-Valued Matrix Differentiation: Techniques and Key Results , 2007, IEEE Transactions on Signal Processing.
[4] N. L. Johnson,et al. Continuous Univariate Distributions. , 1995 .
[5] Vincent Fusco,et al. Orthogonal Vector Approach for Synthesis of Multi-Beam Directional Modulation Transmitters , 2015, IEEE Antennas and Wireless Propagation Letters.
[6] R. Michael Buehrer,et al. BER performance of a uniform circular array versus a uniform linear array in a mobile radio environment , 2004, IEEE Transactions on Wireless Communications.
[7] Theodoros A. Tsiftsis,et al. Multiple Antennas Secure Transmission Under Pilot Spoofing and Jamming Attack , 2018, IEEE Journal on Selected Areas in Communications.
[8] Thomas Kailath,et al. ESPRIT-estimation of signal parameters via rotational invariance techniques , 1989, IEEE Trans. Acoust. Speech Signal Process..
[9] Yiqiang Yu,et al. Introduction to Direction-Of-Arrival Estimation , 2010 .
[10] Sathish Chandran,et al. Advances in Direction-of-Arrival Estimation , 2005 .
[11] Petre Stoica,et al. MUSIC, maximum likelihood, and Cramer-Rao bound , 1989, IEEE Transactions on Acoustics, Speech, and Signal Processing.
[12] Can Emre Koksal,et al. Securing massive MIMO at the physical layer , 2015, 2015 IEEE Conference on Communications and Network Security (CNS).
[13] J.E. Mazo,et al. Digital communications , 1985, Proceedings of the IEEE.
[14] Andrea Goldsmith,et al. Error statistics of real-time power measurements in cellular channels with multipath and shadowing , 1994 .
[15] Alex B. Gershman,et al. Training-based MIMO channel estimation: a study of estimator tradeoffs and optimal training signals , 2006, IEEE Transactions on Signal Processing.
[16] Lang Tong,et al. Optimal design and placement of pilot symbols for channel estimation , 2001, 2001 IEEE International Conference on Acoustics, Speech, and Signal Processing. Proceedings (Cat. No.01CH37221).
[17] Charles R. Johnson,et al. Topics in Matrix Analysis , 1991 .
[18] Qi Xiong,et al. An Energy-Ratio-Based Approach for Detecting Pilot Spoofing Attack in Multiple-Antenna Systems , 2015, IEEE Transactions on Information Forensics and Security.
[19] Martin E. Hellman,et al. The Gaussian wire-tap channel , 1978, IEEE Trans. Inf. Theory.
[20] S. Kay. Fundamentals of statistical signal processing: estimation theory , 1993 .
[21] Jitendra K. Tugnait,et al. Self-Contamination for Detection of Pilot Contamination Attack in Multiple Antenna Systems , 2015, IEEE Wireless Communications Letters.
[22] Robert H. Halstead,et al. Matrix Computations , 2011, Encyclopedia of Parallel Computing.
[23] Jinho Choi,et al. Secret Key Agreement With Large Antenna Arrays Under the Pilot Contamination Attack , 2015, IEEE Transactions on Wireless Communications.
[24] Robert Schober,et al. Pilot Spoofing Attack by Multiple Eavesdroppers , 2018, IEEE Transactions on Wireless Communications.
[25] P. Uthansakul,et al. Angular beamforming technique for MIMO beamforming system , 2012, 2012 9th International Conference on Electrical Engineering/Electronics, Computer, Telecommunications and Information Technology.
[26] Harry L. Van Trees,et al. Optimum Array Processing: Part IV of Detection, Estimation, and Modulation Theory , 2002 .
[27] Robert L. Wolpert,et al. Statistical Inference , 2019, Encyclopedia of Social Network Analysis and Mining.
[28] Theodore S. Rappaport,et al. Overview of spatial channel models for antenna array communication systems , 1998, IEEE Wirel. Commun..
[29] Jitendra K. Tugnait,et al. Pilot Spoofing Attack Detection and Countermeasure , 2018, IEEE Transactions on Communications.
[30] I. Olkin,et al. Inequalities: Theory of Majorization and Its Applications , 1980 .
[31] Thomas Kailath,et al. Detection of signals by information theoretic criteria , 1985, IEEE Trans. Acoust. Speech Signal Process..
[32] M. J. Gans,et al. On Limits of Wireless Communications in a Fading Environment when Using Multiple Antennas , 1998, Wirel. Pers. Commun..
[33] Wade Trappe,et al. On the Vulnerabilities of CSI in MIMO Wireless Communication Systems , 2012, IEEE Transactions on Mobile Computing.
[34] T. Engin Tuncer,et al. Classical and Modern Direction-of-Arrival Estimation , 2009 .
[35] Jitendra K. Tugnait. Detection and Identification of Spoofed Pilots in TDD/SDMA Systems , 2017, IEEE Wireless Communications Letters.
[36] Charles R. Johnson,et al. Matrix analysis , 1985, Statistical Inference for Engineers and Data Scientists.
[37] Derrick Wing Kwan Ng,et al. Secure Massive MIMO Transmission With an Active Eavesdropper , 2015, IEEE Transactions on Information Theory.
[38] Emre Telatar,et al. Capacity of Multi-antenna Gaussian Channels , 1999, Eur. Trans. Telecommun..
[39] Gerard J. Foschini,et al. Layered space-time architecture for wireless communication in a fading environment when using multi-element antennas , 1996, Bell Labs Technical Journal.
[40] C. Emre Koksal,et al. Physical Layer Security in Massive MIMO , 2015, 1505.00396.
[41] Xiangyun Zhou,et al. Pilot Contamination for Active Eavesdropping , 2012, IEEE Transactions on Wireless Communications.
[42] Jian Li,et al. Fully automatic computation of diagonal loading levels for robust adaptive beamforming , 2008, 2008 IEEE International Conference on Acoustics, Speech and Signal Processing.
[43] John B. Shoven,et al. I , Edinburgh Medical and Surgical Journal.
[44] G. Casella,et al. Statistical Inference , 2003, Encyclopedia of Social Network Analysis and Mining.
[45] Qi Xiong,et al. Secure Transmission Against Pilot Spoofing Attack: A Two-Way Training-Based Scheme , 2016, IEEE Transactions on Information Forensics and Security.
[46] Weihua Zhuang,et al. On Countermeasures of Pilot Spoofing Attack in Massive MIMO Systems: A Double Channel Training Based Approach , 2019, IEEE Transactions on Vehicular Technology.