Abstract
Physical layer security (PLS) provides an additional protection layer to the conventional encryption in the presence of an active eavesdropper (Eve). The detection of pilot contamination attack (PCA) on legitimate nodes by the active Eve is vital in order to mitigate the effect of the attack. In this work, we propose a novel PCA detector for the nodes, which intend to establish secure communication in time division duplex (TDD) mode over a frequency selective channel. We devise binary hypothesis from the decision directed channel estimate for PCA detection by exploiting observations of pilot sequence and random data in pilot and data phases, respectively. We also provide performance analysis of the proposed method. The comparison of simulation results and analysis demonstrates the accuracy of the analysis. The proposed detector has low probability of detection error as compared to the existing high complexity sub-space based PCA detector.
Highlights
Wireless communication networks are widely used in military and civilian applications and have become an integral part of our lives
We present the performance of the coherent data estimate using the contaminated pilot phase channel estimate in (4) in terms of bit error rate (BER)
In this work, we presented two novel pilot assisted binary hypothesis (PABH) and directed binary hypothesis (DDBH) pilot contamination attack (PCA) detectors for frequency selective channels, which exploit the pilot and data phase observations
Summary
Wireless communication networks are widely used in military and civilian applications and have become an integral part of our lives. The security of a communication system is achieved by conventional encryption methods at application layer, which have well-known weaknesses [4], [5]. Physical layer (PHY) security has emerged as an effective approach to provide additional security at the top of conventional encryption [4], [6], [7]. Physical layer security approaches exploit characteristics of wireless channel to prevent eavesdropping [8]. Following the work in [9], extensive research has been conducted to ensure secure transmission using physical layer security, such as cooperative relaying [10]–[12], interference management [13]–[15] and artificial jamming [16].
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.