Pilot Spoofing Attack

  • Living reference work entry
  • First Online:
Encyclopedia of Wireless Networks

Synonyms

Pilot contamination attack; Spoofing attack

Definitions

Pilot spoofing attack refers to an active attack in wireless networks, where active eavesdroppers (Eves) manipulate the channel estimation to increase the eavesdrop** rate. In time division duplex (TDD) systems with channel reciprocity, the downlink channel state information (CSI) can be acquired through uplink channel training. A smart active Eve may hack such channel estimation process by sending an identical pilot sequence to the base station (BS), causing an erroneous channel estimation at the BS and more information leak to the Eve.

Background

By exploiting the randomness of wireless medium, physical layer security can provide lightweight security solution for low-cost Internet of Things (IoT) devices and has been regarded as a promising solution to enhance security in emerging large-scale heterogeneous networks (HetNets) (Mukherjee 2015; Poor and Schaefer 2017). The information-theoretical security was...

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

References

  • Bai T, Heath RW (2016) Analyzing uplink SINR and rate in massive MIMO systems using stochastic geometry. IEEE Trans Commun 64(11):4592–4606

    Article  Google Scholar 

  • Basciftci YO, Koksal CE, Ashikhmin A (2015) Physical layer security in massive MIMO. ar**v preprint ar**v:150500396

    Google Scholar 

  • Björnson E, Sanguinetti L, Kountouris M (2016) Deploying dense networks for maximal energy efficiency: small cells meet massive MIMO. IEEE J Sel Areas Commun 34(4):832–847

    Article  Google Scholar 

  • Leung-Yan-Cheong SK, Hellman ME (1978) The Gaussian wire-tap channel. IEEE Trans Inf Theory 24(4):451–456

    Article  MathSciNet  Google Scholar 

  • Mukherjee A (2015) Physical-layer security in the internet of things: sensing and communication confidentiality under resource constraints. Proc IEEE 103(10):1747–1761

    Article  Google Scholar 

  • Poor HV, Schaefer RF (2017) Wireless physical layer security. Proc Natl Acad Sci 114(1):19–26

    Article  Google Scholar 

  • Tugnait JK (2015) Self-contamination for detection of pilot contamination attack in multiple antenna systems. IEEE Wirel Commun Lett 4(5):525–528

    Article  Google Scholar 

  • Wang HM, Huang KW, Tsiftsis TA (2018a) Multiple antennas secure transmission under pilot spoofing and jamming attack. IEEE J Sel Areas Commun 36(4):860–876

    Article  Google Scholar 

  • Wang W, Teh KC, Luo S, Li KH (2018b) Physical layer security in heterogeneous networks with pilot attack: a stochastic geometry approach. IEEE Trans Commun, to appear. https://doi.org/10.1109/TCOMM.2018.2859954

    Article  Google Scholar 

  • Wu Y, Schober R, Ng DWK, **ao C, Caire G (2016) Secure massive MIMO transmission with an active eavesdropper. IEEE Trans Inf Theory 62(7):3880–3900

    Article  MathSciNet  Google Scholar 

  • Wyner AD (1975) The wire-tap channel. Bell Syst Tech J 54(8):1355–1387

    Article  MathSciNet  Google Scholar 

  • **ong Q, Liang YC, Li KH, Gong Y (2015) An energy-ratio-based approach for detecting pilot spoofing attack in multiple-antenna systems. IEEE Trans Inf Forensic Secur 10(5):932–940

    Article  Google Scholar 

  • Zhou X, Maham B, Hjorungnes A (2012) Pilot contamination for active eavesdrop**. IEEE Trans Wirel Commun 11(3):903–907

    Article  Google Scholar 

  • Zhu J, Schober R, Bhargava VK (2014) Secure transmission in multicell massive MIMO systems. IEEE Trans Wirel Commun 13(9):4766–4781

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Wei Wang .

Editor information

Editors and Affiliations

Section Editor information

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Switzerland AG

About this entry

Check for updates. Verify currency and authenticity via CrossMark

Cite this entry

Wang, W. (2019). Pilot Spoofing Attack. In: Shen, X., Lin, X., Zhang, K. (eds) Encyclopedia of Wireless Networks. Springer, Cham. https://doi.org/10.1007/978-3-319-32903-1_319-1

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-32903-1_319-1

  • Received:

  • Accepted:

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-32903-1

  • Online ISBN: 978-3-319-32903-1

  • eBook Packages: Springer Reference Computer SciencesReference Module Computer Science and Engineering

Publish with us

Policies and ethics

Navigation