Loading…

Physical layer security using massive multiple-input and multiple-output: passive and active eavesdroppers

Physical layer security is considered as a promising technique that exploits the channel properties in order to send confidential messages to the legitimate receiver even in the presence of a powerful eavesdropper and the absence of its channel information. In this study, the authors consider the ef...

Full description

Saved in:
Bibliographic Details
Published in:IET communications 2016-01, Vol.10 (1), p.50-56
Main Author: Al-nahari, Azzam
Format: Article
Language:English
Subjects:
Citations: Items that this one cites
Items that cite this one
Online Access:Request full text
Tags: Add Tag
No Tags, Be the first to tag this record!
Description
Summary:Physical layer security is considered as a promising technique that exploits the channel properties in order to send confidential messages to the legitimate receiver even in the presence of a powerful eavesdropper and the absence of its channel information. In this study, the authors consider the effect of massive multiple-input and multiple-output (MMIMO) system operating in TDD mode in improving the physical layer security in the presence of multi-antennas eavesdropper. The channel state information (CSI) of the eavesdropper is assumed not known at the transmitter side, and also imperfect CSI of the legitimate receiver is assumed. The first important finding is that MMIMO is a valuable technique to combat passive eavesdropping, where it is shown that the achievable secrecy rate increases logarithmically with the number of transmit antennas. However, the eavesdropper can be active and attack the training phase of the legitimate transmitter. As a consequence, this dramatically reduces the achievable secrecy rate. The second contribution of this study is a simple protocol that can effectively detect this attack so that a countermeasure can be taken. Closed-form expressions for the detection and false-alarm probabilities are derived. Moreover, the authors analyse the intercept probability and show that asymptotically exponential diversity is achieved.
ISSN:1751-8628
1751-8636
1751-8636
DOI:10.1049/iet-com.2015.0216