2019
DOI: 10.1109/tifs.2018.2850334
|View full text |Cite
|
Sign up to set email alerts
|

Independence-Checking Coding for OFDM Channel Training Authentication: Protocol Design, Security, Stability, and Tradeoff Analysis

Abstract: In wireless OFDM communications systems, pilot tones, due to their publicly-known and deterministic characteristic, suffer significant jamming/nulling/spoofing risks. Thus, the convectional channel training protocol using pilot tones could be attacked and paralysed, which raises the issue of anti-attack channel training authentication (CTA), that is, verifying the claims of identities of pilot tones and channel estimation samples. In this paper, we consider one-ring scattering scenarios with largescale uniform… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2

Citation Types

0
17
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
6
1
1

Relationship

1
7

Authors

Journals

citations
Cited by 32 publications
(17 citation statements)
references
References 33 publications
0
17
0
Order By: Relevance
“…Karlsson et al [9] theoretically analyzed the vulnerability of TDD-massive MIMO to pilot interference. Xu et al [10] develop a novel coding scheme to authenticate the channel training phase using an independence-checking coding (ICC)-based protocol. In our prior work in [5], we have demonstrated the vulnerability of LTE to pilot interference through software-defined radio (SDR)-based experiments.…”
mentioning
confidence: 99%
“…Karlsson et al [9] theoretically analyzed the vulnerability of TDD-massive MIMO to pilot interference. Xu et al [10] develop a novel coding scheme to authenticate the channel training phase using an independence-checking coding (ICC)-based protocol. In our prior work in [5], we have demonstrated the vulnerability of LTE to pilot interference through software-defined radio (SDR)-based experiments.…”
mentioning
confidence: 99%
“…There are two PLS based research routes to protect pilots, including deterministic-pilot based approach and randompilot based approach. The former is limited to how to detect pilot-aware attack by exploiting the physical layer information, such as auxiliary training or data sequences [19], [20] and some prior known channel information [21]- [23] whereas the latter aims to avoid it by pilot randomization [15], [24], [25]. The importance of pilot randomization on time-frequency resources to avoid pilot aware attack on pilot subcarriers have been stressed in orthogonal frequency-division multiplexing (OFDM) systems [26].…”
Section: A Related Workmentioning
confidence: 99%
“…To solve this, authors in [33] proposed a coding based TRP framework by exploiting pilot randomization and subcarrierblock discriminating coding (SBDC) mechanism. In [15], the authors considered a practical one-ring scattering scenario and proposed an independence-checking coding (ICC) theory to secure TRP under pilot aware attack. When pilot aware attack happens, TRP under those schemes highly rely on the coding diversity and spatial fading correlation difference between UE and the attacker.…”
Section: A Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Furthermore, in order to manipulate fine-grained feature space in IoSCT, specific neural network models can be set up to express complex dynamics process in society system. Neural network is a type of mathematical algorithm for distributed parallel information processing [29], and imitates neuro system characteristics of animals to realize complicated computation [31], [32]. Specific to the issue of sustainability prediction, major investigation object lies in the coordinated relationships between urbanization and ecological civilization [30] which is major focus of this research.…”
Section: Introductionmentioning
confidence: 99%