Channel Estimation for Massive MIMO Uplink Under Active Jamming Attack

被引:0
作者
Cao, Ruohan [1 ,2 ]
Gao, Hui [1 ,2 ]
Lu, Yueming [1 ,2 ]
机构
[1] Minist Educ, Key Lab Trustworthy Distributed Comp & Serv, Beijing 100876, Peoples R China
[2] Beijing Univ Posts & Telecommun, Sch Informat & Commun Engn, Beijing 100876, Peoples R China
来源
IEEE SYSTEMS JOURNAL | 2023年 / 17卷 / 02期
基金
中国国家自然科学基金;
关键词
Channel estimation; Symbols; Jamming; Partial transmit sequences; Data mining; Uplink; Training; Blind channel separation; massive multiple-input-multiple-output (MIMO); spoofing attack; PILOT CONTAMINATION ATTACK; BOUNDED COMPONENT ANALYSIS; SPOOFING ATTACK; CHALLENGES; ALGORITHMS; SYSTEMS; NUMBER;
D O I
10.1109/JSYST.2022.3209790
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We consider channel estimation (CE) against jamming attack (JA) in a single cell massive multiple-input-multiple-output (MIMO) system, wherein malicious users (MUs) want to beguile the base station (BS) into obtaining false channel state information. The MUs perform JA in uplink by sending jamming symbols to the BS through pilot and data transmission of the legitimate users (LUs). Especially, its employed active JA strategies include 1) sending the jamming symbols according to arbitrary distributions that are unknown to the BS; and 2) sending the jamming symbols that are correlative to those of the LUs. We analyze the empirical distribution of the uplink received signals (ED-RS), and prove that its characteristic function (CF) asymptotically approaches to the product of the CFs of the desired signal (DS) and the noise, where the DS is the product of the channel matrix and the signal sequences sent by the LUs/MUs. Motivated by the proof, our proposed extractor first estimates the CF of DS from the ED-RS and then extracts the alphabet of the DS. The extracted alphabet includes linear combinations of channel vectors of LUs and MUs, which leads to CE from the alphabet decomposition. Both analysis and simulation confirm that the proposed CE achieves good performance.
引用
收藏
页码:3258 / 3269
页数:12
相关论文
共 35 条
[1]  
Cao RH, 2018, EUR SIGNAL PR CONF, P2559, DOI 10.23919/EUSIPCO.2018.8553024
[2]   A Survey on Multiple-Antenna Techniques for Physical Layer Security [J].
Chen, Xiaoming ;
Ng, Derrick Wing Kwan ;
Gerstacker, Wolfgang H. ;
Chen, Hsiao-Hwa .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2017, 19 (02) :1027-1053
[3]  
Comon P, 2010, HANDBOOK OF BLIND SOURCE SEPARATION: INDEPENDENT COMPONENT ANALYSIS AND APPLICATIONS, P1
[4]   INDEPENDENT COMPONENT ANALYSIS, A NEW CONCEPT [J].
COMON, P .
SIGNAL PROCESSING, 1994, 36 (03) :287-314
[5]   Bounded Component Analysis of Noisy Underdetermined and Overdetermined Mixtures [J].
Cruces, Sergio .
IEEE TRANSACTIONS ON SIGNAL PROCESSING, 2015, 63 (09) :2279-2294
[6]   Bounded Component Analysis of Linear Mixtures: A Criterion of Minimum Convex Perimeter [J].
Cruces, Sergio .
IEEE TRANSACTIONS ON SIGNAL PROCESSING, 2010, 58 (04) :2141-2154
[7]   Blind deconvolution of multi-input single-output systems with binary sources [J].
Diamantaras, Konstantinos I. ;
Papadimitriou, Theophilos .
IEEE TRANSACTIONS ON SIGNAL PROCESSING, 2006, 54 (10) :3720-3731
[8]   Jamming-Resistant Receivers for the Massive MIMO Uplink [J].
Do, Tan Tai ;
Bjornson, Emil ;
Larsson, Erik G. ;
Razavizadeh, S. Mohammad .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2018, 13 (01) :210-223
[9]   A Class of Bounded Component Analysis Algorithms for the Separation of Both Independent and Dependent Sources [J].
Erdogan, Alper T. .
IEEE TRANSACTIONS ON SIGNAL PROCESSING, 2013, 61 (22) :5730-5743
[10]   Fast and robust fixed-point algorithms for independent component analysis [J].
Hyvärinen, A .
IEEE TRANSACTIONS ON NEURAL NETWORKS, 1999, 10 (03) :626-634