Presentation by D. Mihaylova, PhD student of the Sofia University of Technology
Abstract
The implementation of channel estimation procedures in modern wireless networks exposes them to the risk of pilot contamination attacks, which represents a major physical layer security issue. Hence, it is necessary to apply different approaches and methods to the detection of this type of attack. One effective method proposed in the literature is 2-N-PSK pilot detection, which consists of training with two random N-PSK pilots. Although the method is broadly effective, it is not able to detect several types of attacks with certain values of the non-legitimate pilots. In this presentation, two independent techniques which improve the detection capabilities of the original 2-N-PSK method will be proposed. The first is based on channel gain comparison and eliminates the usage of threshold values in the detection – a main drawback of previously existing solution. The second approach suggested relies on the use of legitimate pilots from a shifted constellation dealing with the values of pilot offsets and the relation between legitimate constellations.
Thursday, 21.09.17 at 12:45 in room A 0.35
The implementation of channel estimation procedures in modern wireless networks exposes them to the risk of pilot contamination attacks, which represents a major physical layer security issue. Hence, it is necessary to apply different approaches and methods to the detection of this type of attack. One effective method proposed in the literature is 2-N-PSK pilot detection, which consists of training with two random N-PSK pilots. Although the method is broadly effective, it is not able to detect several types of attacks with certain values of the non-legitimate pilots. In this presentation, two independent techniques which improve the detection capabilities of the original 2-N-PSK method will be proposed. The first is based on channel gain comparison and eliminates the usage of threshold values in the detection – a main drawback of previously existing solution. The second approach suggested relies on the use of legitimate pilots from a shifted constellation dealing with the values of pilot offsets and the relation between legitimate constellations.
Thursday, 21.09.17 at 12:45 in room A 0.35