Proactive Eavesdropping via Pilot Contamination and Jamming

被引:6
作者
Wan, Linqing [1 ,2 ]
Zhang, Guangchi [1 ]
Cui, Miao [1 ]
Lin, Fan [3 ]
机构
[1] Guangdong Univ Technol, Sch Informat Engn, Guangzhou, Guangdong, Peoples R China
[2] SIPO, Patent Examinat Cooperat Ctr, Patent Off, Guangzhou, Guangdong, Peoples R China
[3] Guangzhou GCI Sci & Technol Co Ltd, Guangzhou, Guangdong, Peoples R China
基金
中国国家自然科学基金;
关键词
Legitimate surveillance; Proactive eavesdropping; Pilot contamination; Jamming; Eavesdropping rate; PHYSICAL LAYER SECURITY; CHANNELS;
D O I
10.1007/s11277-017-5213-0
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
Proactive eavesdropping is a new paradigm shift in wireless physical layer security from preventing conventional eavesdropping attacks to legitimate intercepting suspicious communications, which has attracted a lot of attention recently. Pilot contamination is one effective technique in proactive eavesdropping, which spoofs the suspicious transmitter on channel estimation by sending the same pilot signal as the suspicious receiver, and lets it leak information in the direction of the legitimate eavesdropper during its transmission. However, this technique may fail when an anti-pilot-contamination mechanism called "energy ratio detector (ERD)" is applied at the suspicious receiver. To deal with the case that the suspicious receiver is a smart device using ERD, in this paper, we study using pilot contamination along with jamming to improve the legitimate eavesdropping performance. We first derive a closed-form expression for the probability of pilot contamination being detected by the suspicious receiver, and use it to obtain a closed-form expression for the eavesdropping rate. Using this theoretical analysis result, we propose an algorithm to maximize the eavesdropping rate by jointly optimizing the pilot contamination power and jamming power via two-dimensional search. Simulation results show that the proposed eavesdropping rate maximization algorithm can significantly improve eavesdropping rate, as compared to other benchmark schemes.
引用
收藏
页码:1405 / 1421
页数:17
相关论文
共 21 条
[1]   Half-Duplex Active Eavesdropping in Fast-Fading Channels: A Block-Markov Wyner Secrecy Encoding Scheme [J].
Amariucai, George T. ;
Wei, Shuangqing .
IEEE TRANSACTIONS ON INFORMATION THEORY, 2012, 58 (07) :4660-4677
[2]  
[Anonymous], DATABASE, DOI DOI 10.3390/PHARMACEUTICS8010008
[3]   On the Secrecy Capacity of Block Fading Channels With a Hybrid Adversary [J].
Basciftci, Yuksel Ozan ;
Gungor, Onur ;
Koksal, Can Emre ;
Ozguner, Fusun .
IEEE TRANSACTIONS ON INFORMATION THEORY, 2015, 61 (03) :1325-1343
[4]   Pilot Contamination and Precoding in Multi-Cell TDD Systems [J].
Jose, Jubin ;
Ashikhmin, Alexei ;
Marzetta, Thomas L. ;
Vishwanath, Sriram .
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2011, 10 (08) :2640-2651
[5]   Physical Layer Security for Massive MIMO: An Overview on Passive Eavesdropping and Active Attacks [J].
Kapetanovic, Dzevdan ;
Zheng, Gan ;
Rusek, Fredrik .
IEEE COMMUNICATIONS MAGAZINE, 2015, 53 (06) :21-27
[6]  
Kapetanovic D, 2013, 2013 IEEE 24TH INTERNATIONAL SYMPOSIUM ON PERSONAL, INDOOR, AND MOBILE RADIO COMMUNICATIONS (PIMRC), P13, DOI 10.1109/PIMRC.2013.6666096
[7]   Secure Relay Beamforming for SWIPT in Amplify-and-Forward Two-Way Relay Networks [J].
Li, Quanzhong ;
Zhang, Qi ;
Qin, Jiayin .
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2016, 65 (11) :9006-9019
[8]   Sensing-throughput tradeoff for cognitive radio networks [J].
Liang, Ying-Chang ;
Zeng, Yonghong ;
Peh, Edward C. Y. ;
Hoang, Anh Tuan .
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2008, 7 (04) :1326-1337
[9]   Jamming Games in the MIMO Wiretap Channel With an Active Eavesdropper [J].
Mukherjee, Amitav ;
Swindlehurst, A. Lee .
IEEE TRANSACTIONS ON SIGNAL PROCESSING, 2013, 61 (01) :82-91
[10]  
Mukherjee A, 2011, CONF REC ASILOMAR C, P265, DOI 10.1109/ACSSC.2011.6189999