Pilot Spoofing Attack on the Downlink of Cell-Free Massive MIMO: From the Perspective of Adversaries

被引:3
作者
Xu, Weiyang [1 ]
Wang, Ruiguang [1 ]
Zhang, Yuan [1 ]
Ngo, Hien Quoc
Xiang, Wei [2 ]
机构
[1] Chongqing Univ, Sch Microelect & Commun Engn, Chongqing 400044, Peoples R China
[2] La Trobe Univ, Sch Engn & Math Sci, Melbourne, Vic 3086, Australia
关键词
Cell-free massive MIMO; pilot spoofing attack; downlink training; achievable rate; power optimization; PHYSICAL LAYER SECURITY; CHANNEL; SYSTEMS;
D O I
10.1109/TIFS.2024.3402973
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The channel hardening effect is less pronounced in the cell-free massive multiple-input multiple-output (mMIMO) system compared to its cellular counterpart, making it necessary to estimate the downlink effective channel gains to ensure decent performance. However, the downlink training inadvertently creates an opportunity for adversarial nodes to launch pilot spoofing attacks (PSAs). First, we demonstrate that adversarial distributed access points (APs) can severely degrade the achievable downlink rate. They achieve this by estimating their channels to users in the uplink training phase and then precoding and sending the same pilot sequences as those used by legitimate APs during the downlink training phase. Then, the impact of the downlink PSA is investigated by rigorously deriving a closed-form expression of the per-user achievable downlink rate. By employing the min-max criterion to optimize the power allocation coefficients, the maximum per-user achievable rate of downlink transmission is minimized from the perspective of adversarial APs. As an alternative to the downlink PSA, adversarial APs may opt to precode random interference during the downlink data transmission phase in order to disrupt legitimate communications. In this scenario, the achievable downlink rate is derived, and then power optimization algorithms are also developed. We present numerical results to showcase the detrimental impact of the downlink PSA and compare the effects of these two types of attacks.
引用
收藏
页码:5641 / 5654
页数:14
相关论文
共 25 条
  • [1] Channel Hardening and Favorable Propagation in Cell-Free Massive MIMO With Stochastic Geometry
    Chen, Zheng
    Bjornson, Emil
    [J]. IEEE TRANSACTIONS ON COMMUNICATIONS, 2018, 66 (11) : 5205 - 5219
  • [2] Exploiting RIS for Limiting Information Leakage to Active Eavesdropper in Cell-Free Massive MIMO
    Elhoushy, Salah
    Ibrahim, Mohamed
    Hamouda, Walaa
    [J]. IEEE WIRELESS COMMUNICATIONS LETTERS, 2022, 11 (03) : 443 - 447
  • [3] Cell-Free Massive MIMO: A Survey
    Elhoushy, Salah
    Ibrahim, Mohamed
    Hamouda, Walaa
    [J]. IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2022, 24 (01): : 492 - 523
  • [4] Secure Optimal Precoding for User-Centric Cell-Free Massive MIMO System
    Gao, Xiang
    Li, Yong
    Cheng, Wei
    Dong, Limeng
    Liu, Penglu
    [J]. IEEE WIRELESS COMMUNICATIONS LETTERS, 2023, 12 (01) : 31 - 35
  • [5] Cell-Free Massive MIMO Versus Small Cells
    Hien Quoc Ngo
    Ashikhmin, Alexei
    Yang, Hong
    Larsson, Erik G.
    Marzetta, Thomas L.
    [J]. IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2017, 16 (03) : 1834 - 1850
  • [6] Cell-Free Massive MIMO Networks: Optimal Power Control Against Active Eavesdropping
    Hoang, Tiep M.
    Hien Quoc Ngo
    Duong, Trung Q.
    Hoang Duong Tuan
    Marshall, Alan
    [J]. IEEE TRANSACTIONS ON COMMUNICATIONS, 2018, 66 (10) : 4724 - 4737
  • [7] Downlink Training in Cell-Free Massive MIMO: A Blessing in Disguise
    Interdonato, Giovanni
    Hien Quoc Ngo
    Frenger, Pal
    Larsson, Erik G.
    [J]. IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2019, 18 (11) : 5153 - 5169
  • [8] Secrecy Energy Efficiency Maximization for Multi-User Multi-Eavesdropper Cell-Free Massive MIMO Networks
    Jiang, Yuhan
    Zou, Yulong
    [J]. IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2023, 72 (05) : 6009 - 6022
  • [9] Physical Layer Security for Massive MIMO: An Overview on Passive Eavesdropping and Active Attacks
    Kapetanovic, Dzevdan
    Zheng, Gan
    Rusek, Fredrik
    [J]. IEEE COMMUNICATIONS MAGAZINE, 2015, 53 (06) : 21 - 27
  • [10] Applications of second-order cone programming
    Lobo, MS
    Vandenberghe, L
    Boyd, S
    Lebret, H
    [J]. LINEAR ALGEBRA AND ITS APPLICATIONS, 1998, 284 (1-3) : 193 - 228