Loading…

Physical layer security using massive multiple-input and multiple-output: passive and active eavesdroppers

Physical layer security is considered as a promising technique that exploits the channel properties in order to send confidential messages to the legitimate receiver even in the presence of a powerful eavesdropper and the absence of its channel information. In this study, the authors consider the ef...

Full description

Saved in:
Bibliographic Details
Published in:IET communications 2016-01, Vol.10 (1), p.50-56
Main Author: Al-nahari, Azzam
Format: Article
Language:English
Subjects:
Citations: Items that this one cites
Items that cite this one
Online Access:Request full text
Tags: Add Tag
No Tags, Be the first to tag this record!
cited_by cdi_FETCH-LOGICAL-c4017-718ce441192467ab451aaa71563811e4b8a3014d9b38f16632991fe5e979f1ad3
cites cdi_FETCH-LOGICAL-c4017-718ce441192467ab451aaa71563811e4b8a3014d9b38f16632991fe5e979f1ad3
container_end_page 56
container_issue 1
container_start_page 50
container_title IET communications
container_volume 10
creator Al-nahari, Azzam
description Physical layer security is considered as a promising technique that exploits the channel properties in order to send confidential messages to the legitimate receiver even in the presence of a powerful eavesdropper and the absence of its channel information. In this study, the authors consider the effect of massive multiple-input and multiple-output (MMIMO) system operating in TDD mode in improving the physical layer security in the presence of multi-antennas eavesdropper. The channel state information (CSI) of the eavesdropper is assumed not known at the transmitter side, and also imperfect CSI of the legitimate receiver is assumed. The first important finding is that MMIMO is a valuable technique to combat passive eavesdropping, where it is shown that the achievable secrecy rate increases logarithmically with the number of transmit antennas. However, the eavesdropper can be active and attack the training phase of the legitimate transmitter. As a consequence, this dramatically reduces the achievable secrecy rate. The second contribution of this study is a simple protocol that can effectively detect this attack so that a countermeasure can be taken. Closed-form expressions for the detection and false-alarm probabilities are derived. Moreover, the authors analyse the intercept probability and show that asymptotically exponential diversity is achieved.
doi_str_mv 10.1049/iet-com.2015.0216
format article
fullrecord <record><control><sourceid>proquest_24P</sourceid><recordid>TN_cdi_crossref_primary_10_1049_iet_com_2015_0216</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>1808055843</sourcerecordid><originalsourceid>FETCH-LOGICAL-c4017-718ce441192467ab451aaa71563811e4b8a3014d9b38f16632991fe5e979f1ad3</originalsourceid><addsrcrecordid>eNqFkD1PwzAQhiMEEqXwA9gywpDiS5zE6QZVC5ValaGdLTe5gCvnAzsB5d_jKBUwgJh8Pj_P6fw6zjWQCRCa3ElsvLQqJj6BcEJ8iE6cEcQheCwKotOv2mfnzoUxB0LCMKJ05ByeXzsjU6FcJTrUrsG01bLp3NbI8sUthDHyHd2iVY2sFXqyrNvGFWX23araxvambn1k-0eRNn2J4h1Npqu6Rm0unbNcKINXx3Ps7Bbz7ezJW20el7P7lZdSArEXA0uRUoDEp1Es9jQEIUQMYRQwAKR7JgICNEv2AcshigI_SSDHEJM4yUFkwdi5GebWunpr0TS8kCZFpUSJVWs4MMLs9xkNLAoDmurKGI05r7UshO44EN7nym2u3ObK-1x5n6t1poPzIRV2_wt8tt75Dwt7JbGVbwe5xw5Vq0ubBF_Ot3y2Wf9w6iy3rPcL-_din-4rnNE</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>1808055843</pqid></control><display><type>article</type><title>Physical layer security using massive multiple-input and multiple-output: passive and active eavesdroppers</title><source>Wiley Online Library Open Access</source><creator>Al-nahari, Azzam</creator><creatorcontrib>Al-nahari, Azzam</creatorcontrib><description>Physical layer security is considered as a promising technique that exploits the channel properties in order to send confidential messages to the legitimate receiver even in the presence of a powerful eavesdropper and the absence of its channel information. In this study, the authors consider the effect of massive multiple-input and multiple-output (MMIMO) system operating in TDD mode in improving the physical layer security in the presence of multi-antennas eavesdropper. The channel state information (CSI) of the eavesdropper is assumed not known at the transmitter side, and also imperfect CSI of the legitimate receiver is assumed. The first important finding is that MMIMO is a valuable technique to combat passive eavesdropping, where it is shown that the achievable secrecy rate increases logarithmically with the number of transmit antennas. However, the eavesdropper can be active and attack the training phase of the legitimate transmitter. As a consequence, this dramatically reduces the achievable secrecy rate. The second contribution of this study is a simple protocol that can effectively detect this attack so that a countermeasure can be taken. Closed-form expressions for the detection and false-alarm probabilities are derived. Moreover, the authors analyse the intercept probability and show that asymptotically exponential diversity is achieved.</description><identifier>ISSN: 1751-8628</identifier><identifier>ISSN: 1751-8636</identifier><identifier>EISSN: 1751-8636</identifier><identifier>DOI: 10.1049/iet-com.2015.0216</identifier><language>eng</language><publisher>The Institution of Engineering and Technology</publisher><subject>active eavesdroppers ; Asymptotic properties ; channel information ; channel properties ; channel state information ; Channels ; Computer information security ; confidential messages ; CSI ; Eavesdropping ; intercept probability ; large‐scale multiple‐input ; large‐scale multiple‐output ; legitimate receiver ; massive multiple‐input and multiple‐output system ; Mathematical analysis ; Messages ; MIMO communication ; MIMO system ; multiantennas eavesdropper ; passive eavesdropping ; physical layer security ; probability ; protocol ; protocols ; radio receivers ; Receivers ; secrecy rate ; TDD mode ; telecommunication security ; transmit antennas ; Transmitters ; wireless channels</subject><ispartof>IET communications, 2016-01, Vol.10 (1), p.50-56</ispartof><rights>The Institution of Engineering and Technology</rights><rights>2021 The Institution of Engineering and Technology</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c4017-718ce441192467ab451aaa71563811e4b8a3014d9b38f16632991fe5e979f1ad3</citedby><cites>FETCH-LOGICAL-c4017-718ce441192467ab451aaa71563811e4b8a3014d9b38f16632991fe5e979f1ad3</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktopdf>$$Uhttps://onlinelibrary.wiley.com/doi/pdf/10.1049%2Fiet-com.2015.0216$$EPDF$$P50$$Gwiley$$H</linktopdf><linktohtml>$$Uhttps://onlinelibrary.wiley.com/doi/full/10.1049%2Fiet-com.2015.0216$$EHTML$$P50$$Gwiley$$H</linktohtml><link.rule.ids>314,776,780,9735,11542,27903,27904,46030,46454</link.rule.ids><linktorsrc>$$Uhttps://onlinelibrary.wiley.com/doi/abs/10.1049%2Fiet-com.2015.0216$$EView_record_in_Wiley-Blackwell$$FView_record_in_$$GWiley-Blackwell</linktorsrc></links><search><creatorcontrib>Al-nahari, Azzam</creatorcontrib><title>Physical layer security using massive multiple-input and multiple-output: passive and active eavesdroppers</title><title>IET communications</title><description>Physical layer security is considered as a promising technique that exploits the channel properties in order to send confidential messages to the legitimate receiver even in the presence of a powerful eavesdropper and the absence of its channel information. In this study, the authors consider the effect of massive multiple-input and multiple-output (MMIMO) system operating in TDD mode in improving the physical layer security in the presence of multi-antennas eavesdropper. The channel state information (CSI) of the eavesdropper is assumed not known at the transmitter side, and also imperfect CSI of the legitimate receiver is assumed. The first important finding is that MMIMO is a valuable technique to combat passive eavesdropping, where it is shown that the achievable secrecy rate increases logarithmically with the number of transmit antennas. However, the eavesdropper can be active and attack the training phase of the legitimate transmitter. As a consequence, this dramatically reduces the achievable secrecy rate. The second contribution of this study is a simple protocol that can effectively detect this attack so that a countermeasure can be taken. Closed-form expressions for the detection and false-alarm probabilities are derived. Moreover, the authors analyse the intercept probability and show that asymptotically exponential diversity is achieved.</description><subject>active eavesdroppers</subject><subject>Asymptotic properties</subject><subject>channel information</subject><subject>channel properties</subject><subject>channel state information</subject><subject>Channels</subject><subject>Computer information security</subject><subject>confidential messages</subject><subject>CSI</subject><subject>Eavesdropping</subject><subject>intercept probability</subject><subject>large‐scale multiple‐input</subject><subject>large‐scale multiple‐output</subject><subject>legitimate receiver</subject><subject>massive multiple‐input and multiple‐output system</subject><subject>Mathematical analysis</subject><subject>Messages</subject><subject>MIMO communication</subject><subject>MIMO system</subject><subject>multiantennas eavesdropper</subject><subject>passive eavesdropping</subject><subject>physical layer security</subject><subject>probability</subject><subject>protocol</subject><subject>protocols</subject><subject>radio receivers</subject><subject>Receivers</subject><subject>secrecy rate</subject><subject>TDD mode</subject><subject>telecommunication security</subject><subject>transmit antennas</subject><subject>Transmitters</subject><subject>wireless channels</subject><issn>1751-8628</issn><issn>1751-8636</issn><issn>1751-8636</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2016</creationdate><recordtype>article</recordtype><recordid>eNqFkD1PwzAQhiMEEqXwA9gywpDiS5zE6QZVC5ValaGdLTe5gCvnAzsB5d_jKBUwgJh8Pj_P6fw6zjWQCRCa3ElsvLQqJj6BcEJ8iE6cEcQheCwKotOv2mfnzoUxB0LCMKJ05ByeXzsjU6FcJTrUrsG01bLp3NbI8sUthDHyHd2iVY2sFXqyrNvGFWX23araxvambn1k-0eRNn2J4h1Npqu6Rm0unbNcKINXx3Ps7Bbz7ezJW20el7P7lZdSArEXA0uRUoDEp1Es9jQEIUQMYRQwAKR7JgICNEv2AcshigI_SSDHEJM4yUFkwdi5GebWunpr0TS8kCZFpUSJVWs4MMLs9xkNLAoDmurKGI05r7UshO44EN7nym2u3ObK-1x5n6t1poPzIRV2_wt8tt75Dwt7JbGVbwe5xw5Vq0ubBF_Ot3y2Wf9w6iy3rPcL-_din-4rnNE</recordid><startdate>20160104</startdate><enddate>20160104</enddate><creator>Al-nahari, Azzam</creator><general>The Institution of Engineering and Technology</general><scope>AAYXX</scope><scope>CITATION</scope><scope>7SC</scope><scope>7SP</scope><scope>8FD</scope><scope>JQ2</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope></search><sort><creationdate>20160104</creationdate><title>Physical layer security using massive multiple-input and multiple-output: passive and active eavesdroppers</title><author>Al-nahari, Azzam</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c4017-718ce441192467ab451aaa71563811e4b8a3014d9b38f16632991fe5e979f1ad3</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2016</creationdate><topic>active eavesdroppers</topic><topic>Asymptotic properties</topic><topic>channel information</topic><topic>channel properties</topic><topic>channel state information</topic><topic>Channels</topic><topic>Computer information security</topic><topic>confidential messages</topic><topic>CSI</topic><topic>Eavesdropping</topic><topic>intercept probability</topic><topic>large‐scale multiple‐input</topic><topic>large‐scale multiple‐output</topic><topic>legitimate receiver</topic><topic>massive multiple‐input and multiple‐output system</topic><topic>Mathematical analysis</topic><topic>Messages</topic><topic>MIMO communication</topic><topic>MIMO system</topic><topic>multiantennas eavesdropper</topic><topic>passive eavesdropping</topic><topic>physical layer security</topic><topic>probability</topic><topic>protocol</topic><topic>protocols</topic><topic>radio receivers</topic><topic>Receivers</topic><topic>secrecy rate</topic><topic>TDD mode</topic><topic>telecommunication security</topic><topic>transmit antennas</topic><topic>Transmitters</topic><topic>wireless channels</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Al-nahari, Azzam</creatorcontrib><collection>CrossRef</collection><collection>Computer and Information Systems Abstracts</collection><collection>Electronics &amp; Communications Abstracts</collection><collection>Technology Research Database</collection><collection>ProQuest Computer Science Collection</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts – Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><jtitle>IET communications</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Al-nahari, Azzam</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Physical layer security using massive multiple-input and multiple-output: passive and active eavesdroppers</atitle><jtitle>IET communications</jtitle><date>2016-01-04</date><risdate>2016</risdate><volume>10</volume><issue>1</issue><spage>50</spage><epage>56</epage><pages>50-56</pages><issn>1751-8628</issn><issn>1751-8636</issn><eissn>1751-8636</eissn><abstract>Physical layer security is considered as a promising technique that exploits the channel properties in order to send confidential messages to the legitimate receiver even in the presence of a powerful eavesdropper and the absence of its channel information. In this study, the authors consider the effect of massive multiple-input and multiple-output (MMIMO) system operating in TDD mode in improving the physical layer security in the presence of multi-antennas eavesdropper. The channel state information (CSI) of the eavesdropper is assumed not known at the transmitter side, and also imperfect CSI of the legitimate receiver is assumed. The first important finding is that MMIMO is a valuable technique to combat passive eavesdropping, where it is shown that the achievable secrecy rate increases logarithmically with the number of transmit antennas. However, the eavesdropper can be active and attack the training phase of the legitimate transmitter. As a consequence, this dramatically reduces the achievable secrecy rate. The second contribution of this study is a simple protocol that can effectively detect this attack so that a countermeasure can be taken. Closed-form expressions for the detection and false-alarm probabilities are derived. Moreover, the authors analyse the intercept probability and show that asymptotically exponential diversity is achieved.</abstract><pub>The Institution of Engineering and Technology</pub><doi>10.1049/iet-com.2015.0216</doi><tpages>7</tpages></addata></record>
fulltext fulltext_linktorsrc
identifier ISSN: 1751-8628
ispartof IET communications, 2016-01, Vol.10 (1), p.50-56
issn 1751-8628
1751-8636
1751-8636
language eng
recordid cdi_crossref_primary_10_1049_iet_com_2015_0216
source Wiley Online Library Open Access
subjects active eavesdroppers
Asymptotic properties
channel information
channel properties
channel state information
Channels
Computer information security
confidential messages
CSI
Eavesdropping
intercept probability
large‐scale multiple‐input
large‐scale multiple‐output
legitimate receiver
massive multiple‐input and multiple‐output system
Mathematical analysis
Messages
MIMO communication
MIMO system
multiantennas eavesdropper
passive eavesdropping
physical layer security
probability
protocol
protocols
radio receivers
Receivers
secrecy rate
TDD mode
telecommunication security
transmit antennas
Transmitters
wireless channels
title Physical layer security using massive multiple-input and multiple-output: passive and active eavesdroppers
url http://sfxeu10.hosted.exlibrisgroup.com/loughborough?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-24T17%3A30%3A22IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_24P&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Physical%20layer%20security%20using%20massive%20multiple-input%20and%20multiple-output:%20passive%20and%20active%20eavesdroppers&rft.jtitle=IET%20communications&rft.au=Al-nahari,%20Azzam&rft.date=2016-01-04&rft.volume=10&rft.issue=1&rft.spage=50&rft.epage=56&rft.pages=50-56&rft.issn=1751-8628&rft.eissn=1751-8636&rft_id=info:doi/10.1049/iet-com.2015.0216&rft_dat=%3Cproquest_24P%3E1808055843%3C/proquest_24P%3E%3Cgrp_id%3Ecdi_FETCH-LOGICAL-c4017-718ce441192467ab451aaa71563811e4b8a3014d9b38f16632991fe5e979f1ad3%3C/grp_id%3E%3Coa%3E%3C/oa%3E%3Curl%3E%3C/url%3E&rft_id=info:oai/&rft_pqid=1808055843&rft_id=info:pmid/&rfr_iscdi=true