2015
DOI: 10.1109/tifs.2015.2392564
|View full text |Cite
|
Sign up to set email alerts
|

An Energy-Ratio-Based Approach for Detecting Pilot Spoofing Attack in Multiple-Antenna Systems

Abstract: The pilot spoofing attack is one kind of active eavesdropping conducted by a malicious user during the channel estimation phase of the legitimate transmission. In this attack, an intelligent adversary spoofs the transmitter on the estimation of channel state information (CSI) by sending the identical pilot signal as the legitimate receiver, in order to obtain a larger information rate in the data transmission phase. The pilot spoofing attack could also drastically weaken the strength of the received signal at … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
105
0

Year Published

2015
2015
2023
2023

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 141 publications
(105 citation statements)
references
References 21 publications
(24 reference statements)
0
105
0
Order By: Relevance
“…The case of partial channel state information is available at the legitimate users was also considered. The spoofing attack, in which the active adversary tries to modify the channel state information (CSI) of the legitimate channel to obtain more confidential information, was considered in [24].…”
Section: A Related Workmentioning
confidence: 99%
“…The case of partial channel state information is available at the legitimate users was also considered. The spoofing attack, in which the active adversary tries to modify the channel state information (CSI) of the legitimate channel to obtain more confidential information, was considered in [24].…”
Section: A Related Workmentioning
confidence: 99%
“…We follow the system model of [2], [6]. Let s t (n), 1 ≤ n ≤ T , denote the training sequence of length T time samples.…”
Section: System Modelmentioning
confidence: 99%
“…This issue of pilot contamination attack was first noted in [1] and subsequent work on this topic has been sparse [2], [6] in spite of the potential severe consequences of such attacks. Ref.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…The defense schemes against Sybil attack can be categorized into two types: radio resource testing [4] by exploring the resource characteristics of various physical terminals; and key pre-distribution [5] which utilizes key paired identification and key validation verification. However, the limited computational resources of sensors and time-delay validation of packets in WSNs, may decrease the capability of cryptographic protocols.…”
Section: Introductionmentioning
confidence: 99%