Secure communication in relay-assisted massive MIMO downlink with active pilot attacks

D Kudathanthirige, S Timilsina… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
In this paper, the achievable secrecy rate of a relay-assisted massive multiple-input multiple-
output (MIMO) downlink is investigated in the presence of a multi-antenna active/passive …

Physical layer security in massive MIMO systems

RF Schaefer, G Amarasuriya… - 2017 51st Asilomar …, 2017 - ieeexplore.ieee.org
An overview over secure communication in massive multiple-input multiple-output (MIMO)
systems is presented. A massive MIMO base-station serves multiple user nodes by …

Hardware Security Risks and Threat Analyses in Advanced Manufacturing Industry

M Monjur, J Calzadillas, Q Yu - ACM Transactions on Design Automation …, 2023 - dl.acm.org
The advanced manufacturing industry (AMI) faces many unique challenges from the cyber-
physical domain. Security threats are originated from two integral parts: software and …

Detection and identification of spoofed pilots in TDD/SDMA systems

JK Tugnait - IEEE Wireless Communications Letters, 2017 - ieeexplore.ieee.org
In a time-division duplex (TDD) multiple antenna system, the channel state information can
be estimated using reverse training. A pilot spoofing attack occurs when during the training …

Secure transmission in multi-cell multi-user massive MIMO systems with an active eavesdropper

D Hu, W Zhang, L He, J Wu - IEEE Wireless Communications …, 2018 - ieeexplore.ieee.org
In this letter, we investigate secure transmission for multi-cell multi-user massive multiple-
input multiple-output systems with an active eavesdropper. During the uplink (UL) training …

Design and performance analysis of channel estimators under pilot spoofing attacks in multiple-antenna systems

D Darsena, G Gelli, I Iudice… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
In multiple antenna systems employing time-division duplexing, spatial precoder design at
the base station (BS) leverages channel state information acquired through uplink pilot …

Data-aided secure massive MIMO transmission under the pilot contamination attack

Y Wu, CK Wen, W Chen, S Jin… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
In this paper, we study the design of secure communication for time-division duplex multi-
cell multi-user massive multiple-input-multiple-output (MIMO) systems with active …

Sequential anomaly detection against demodulation reference signal spoofing in 5G NR

SD Wang, HM Wang, C Feng… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
In fifth generation (5G) new radio (NR), the demodulation reference signal (DMRS) is
employed for channel estimation as part of coherent demodulation of the physical uplink …

Proactive attack: A strategy for legitimate eavesdropping

H Tran, HJ Zepernick - 2016 IEEE Sixth International …, 2016 - ieeexplore.ieee.org
In this paper, we study a novel approach to eavesdrop the messages of suspicious users for
a surveillance purpose. In particular, we consider a scenario in which the legitimate monitor …

Proactive eavesdropping via covert pilot spoofing attack in multi-antenna systems

X Lu, W Yang, Y Cai, X Guan - IEEE Access, 2019 - ieeexplore.ieee.org
Proactive eavesdropping is an effective method for government to monitor suspicious users
who are deemed to misuse communication systems for illegal activities. In this paper …