2019
DOI: 10.1109/tifs.2018.2859585
|View full text |Cite
|
Sign up to set email alerts
|

Hierarchical 2-D Feature Coding for Secure Pilot Authentication in Multi-User Multi-Antenna OFDM Systems: A Reliability Bound Contraction Perspective

Abstract: Due to the publicly-known and deterministic characteristic of pilot tones, pilot authentication (PA) in multiuser multi-antenna OFDM systems is very suspectable to the jamming/nulling/spoofing behaviors. To solve this, we in this paper develop a hierarchical 2-D feature (H2DF) coding theory that exploits the hidden pilot signal features, i.e., the energy feature and independence feature, to secure pilot information coding which is applied between legitimate parties through a well-designed five-layer hierarchic… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
8
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
4
3

Relationship

2
5

Authors

Journals

citations
Cited by 11 publications
(8 citation statements)
references
References 27 publications
(62 reference statements)
0
8
0
Order By: Relevance
“…There are two PLS based research routes to protect pilots, including deterministic-pilot based approach and randompilot based approach. The former is limited to how to detect pilot-aware attack by exploiting the physical layer information, such as auxiliary training or data sequences [19], [20] and some prior known channel information [21]- [23] whereas the latter aims to avoid it by pilot randomization [15], [24], [25]. The importance of pilot randomization on time-frequency resources to avoid pilot aware attack on pilot subcarriers have been stressed in orthogonal frequency-division multiplexing (OFDM) systems [26].…”
Section: A Related Workmentioning
confidence: 99%
See 3 more Smart Citations
“…There are two PLS based research routes to protect pilots, including deterministic-pilot based approach and randompilot based approach. The former is limited to how to detect pilot-aware attack by exploiting the physical layer information, such as auxiliary training or data sequences [19], [20] and some prior known channel information [21]- [23] whereas the latter aims to avoid it by pilot randomization [15], [24], [25]. The importance of pilot randomization on time-frequency resources to avoid pilot aware attack on pilot subcarriers have been stressed in orthogonal frequency-division multiplexing (OFDM) systems [26].…”
Section: A Related Workmentioning
confidence: 99%
“…When pilot aware attack happens, TRP under those schemes highly rely on the coding diversity and spatial fading correlation difference between UE and the attacker. By relaxing the dependence, authors in [25] proposed a scheme of hierarchical 2-D feature coding (H2DF) coding to encode SAPs to realize TRP reliably. Those schemes help answer the question of how to design TRP between UEs and gNB under pilot randomization and pilot-aware attack.…”
Section: A Related Workmentioning
confidence: 99%
See 2 more Smart Citations
“…Previously, it has been mentioned in [6] that attacking channel estimation is with high priority and more powerefficient than the behavior of jamming data packet decoding. Besides, the recent accidents caused by pilot aware attack indicate that the conventional pilot-based channel estimation is suffering significant risks [7]. The commonsense built to resolve this issue is pilot randomization which transforms the pilot-aware attack into a hybrid attack, including silence cheating (SC), wide-band pilot jamming (WB-PJ), and partial-band pilot jamming (PB-PJ) attack.…”
Section: Introductionmentioning
confidence: 99%