Detection of Pilot Contamination Attack Based on Uncoordinated Frequency Shifts

Weile Zhang,Hai Lin,Ruonan Zhang
DOI: https://doi.org/10.1109/tcomm.2018.2791535
IF: 6.166
2018-01-01
IEEE Transactions on Communications
Abstract:Pilot contamination attack is an important activity of active eavesdropping conducted by a malicious user during channel training phase. This attack is potentially harmful to the physical layer security. In this paper, motivated by the fact that frequency asynchronism could introduce divergence of the transmitted pilot signals between intended user and attacker, we propose a new uncoordinated frequency shift (UFS) scheme for detecting pilot contamination attack in multiple antenna system. During the reverse training phase of the UFS scheme, the legitimate user Bob deliberately introduces multiple random frequency shifts in the publicly known pilot sequence. Since eavesdropper Eve has no knowledge of these random frequency shifts, it is almost impossible for her to pretend exactly like Bob. This provides the opportunity to detect the presence of Eve. An attack detection algorithm is then developed based on source enumeration method. Both the asymptotic performance analysis and numerical results are provided to verify the proposed detection scheme. The proposed scheme is also enhanced based on noise power estimation to cope with attacks from a multi-antenna Eve. Furthermore, the proposed UFS scheme is extended by introducing general parameterized phase shifts. It is demonstrated that the proposed UFS scheme can achieve comparable detection performance as the existing superimposed random sequence based scheme, without sacrifice of legitimate channel estimation performance.
What problem does this paper attempt to address?