2016
DOI: 10.1109/tifs.2016.2516825
|View full text |Cite
|
Sign up to set email alerts
|

Secure Transmission Against Pilot Spoofing Attack: A Two-Way Training-Based Scheme

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2

Citation Types

0
45
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
7
1

Relationship

1
7

Authors

Journals

citations
Cited by 75 publications
(45 citation statements)
references
References 19 publications
0
45
0
Order By: Relevance
“…which satisfy the constraints in L. We should compute ρ ⋆ m just for a few values of the variable φ (e.g., 99 values with equal step size 0.01) in the interval (0, 1), and then compare the results to find their maximum value. For each value of φ, we compute the inversion of a matrix with dimensions M 2 × M 2 to obtain ρ ⋆ m according to (14), subsequently the complexity is of the order M 6 . To reduce the complexity, we can rewrite (14) as…”
Section: Computational Complexitymentioning
confidence: 99%
See 2 more Smart Citations
“…which satisfy the constraints in L. We should compute ρ ⋆ m just for a few values of the variable φ (e.g., 99 values with equal step size 0.01) in the interval (0, 1), and then compare the results to find their maximum value. For each value of φ, we compute the inversion of a matrix with dimensions M 2 × M 2 to obtain ρ ⋆ m according to (14), subsequently the complexity is of the order M 6 . To reduce the complexity, we can rewrite (14) as…”
Section: Computational Complexitymentioning
confidence: 99%
“…For each value of φ, we compute the inversion of a matrix with dimensions M 2 × M 2 to obtain ρ ⋆ m according to (14), subsequently the complexity is of the order M 6 . To reduce the complexity, we can rewrite (14) as…”
Section: Computational Complexitymentioning
confidence: 99%
See 1 more Smart Citation
“…In the literature, there are other works on channel estimation for secret information transmission such as [8]- [10]. But they are not very relevant to this paper as the interest here is to prevent Eve from obtaining its CSI with respect to every transmitter of secret information.…”
Section: Introductionmentioning
confidence: 99%
“…Prior works on the pilot contamination attack have studied mechanisms for enhancing the eavesdropper's performance [25][26][27][28]. Other works propose various approaches for detecting the pilot contamination attack [29][30][31][32][33]. Although these schemes can detect a pilot contamination attack with high probability, [29][30][31][32][33] do not provide an effective transmission scheme in the presence of a pilot contamination attack.…”
Section: Introductionmentioning
confidence: 99%