Loading…
Physical layer security using massive multiple-input and multiple-output: passive and active eavesdroppers
Physical layer security is considered as a promising technique that exploits the channel properties in order to send confidential messages to the legitimate receiver even in the presence of a powerful eavesdropper and the absence of its channel information. In this study, the authors consider the ef...
Saved in:
Published in: | IET communications 2016-01, Vol.10 (1), p.50-56 |
---|---|
Main Author: | |
Format: | Article |
Language: | English |
Subjects: | |
Citations: | Items that this one cites Items that cite this one |
Online Access: | Request full text |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
cited_by | cdi_FETCH-LOGICAL-c4017-718ce441192467ab451aaa71563811e4b8a3014d9b38f16632991fe5e979f1ad3 |
---|---|
cites | cdi_FETCH-LOGICAL-c4017-718ce441192467ab451aaa71563811e4b8a3014d9b38f16632991fe5e979f1ad3 |
container_end_page | 56 |
container_issue | 1 |
container_start_page | 50 |
container_title | IET communications |
container_volume | 10 |
creator | Al-nahari, Azzam |
description | Physical layer security is considered as a promising technique that exploits the channel properties in order to send confidential messages to the legitimate receiver even in the presence of a powerful eavesdropper and the absence of its channel information. In this study, the authors consider the effect of massive multiple-input and multiple-output (MMIMO) system operating in TDD mode in improving the physical layer security in the presence of multi-antennas eavesdropper. The channel state information (CSI) of the eavesdropper is assumed not known at the transmitter side, and also imperfect CSI of the legitimate receiver is assumed. The first important finding is that MMIMO is a valuable technique to combat passive eavesdropping, where it is shown that the achievable secrecy rate increases logarithmically with the number of transmit antennas. However, the eavesdropper can be active and attack the training phase of the legitimate transmitter. As a consequence, this dramatically reduces the achievable secrecy rate. The second contribution of this study is a simple protocol that can effectively detect this attack so that a countermeasure can be taken. Closed-form expressions for the detection and false-alarm probabilities are derived. Moreover, the authors analyse the intercept probability and show that asymptotically exponential diversity is achieved. |
doi_str_mv | 10.1049/iet-com.2015.0216 |
format | article |
fullrecord | <record><control><sourceid>proquest_24P</sourceid><recordid>TN_cdi_crossref_primary_10_1049_iet_com_2015_0216</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>1808055843</sourcerecordid><originalsourceid>FETCH-LOGICAL-c4017-718ce441192467ab451aaa71563811e4b8a3014d9b38f16632991fe5e979f1ad3</originalsourceid><addsrcrecordid>eNqFkD1PwzAQhiMEEqXwA9gywpDiS5zE6QZVC5ValaGdLTe5gCvnAzsB5d_jKBUwgJh8Pj_P6fw6zjWQCRCa3ElsvLQqJj6BcEJ8iE6cEcQheCwKotOv2mfnzoUxB0LCMKJ05ByeXzsjU6FcJTrUrsG01bLp3NbI8sUthDHyHd2iVY2sFXqyrNvGFWX23araxvambn1k-0eRNn2J4h1Npqu6Rm0unbNcKINXx3Ps7Bbz7ezJW20el7P7lZdSArEXA0uRUoDEp1Es9jQEIUQMYRQwAKR7JgICNEv2AcshigI_SSDHEJM4yUFkwdi5GebWunpr0TS8kCZFpUSJVWs4MMLs9xkNLAoDmurKGI05r7UshO44EN7nym2u3ObK-1x5n6t1poPzIRV2_wt8tt75Dwt7JbGVbwe5xw5Vq0ubBF_Ot3y2Wf9w6iy3rPcL-_din-4rnNE</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>1808055843</pqid></control><display><type>article</type><title>Physical layer security using massive multiple-input and multiple-output: passive and active eavesdroppers</title><source>Wiley Online Library Open Access</source><creator>Al-nahari, Azzam</creator><creatorcontrib>Al-nahari, Azzam</creatorcontrib><description>Physical layer security is considered as a promising technique that exploits the channel properties in order to send confidential messages to the legitimate receiver even in the presence of a powerful eavesdropper and the absence of its channel information. In this study, the authors consider the effect of massive multiple-input and multiple-output (MMIMO) system operating in TDD mode in improving the physical layer security in the presence of multi-antennas eavesdropper. The channel state information (CSI) of the eavesdropper is assumed not known at the transmitter side, and also imperfect CSI of the legitimate receiver is assumed. The first important finding is that MMIMO is a valuable technique to combat passive eavesdropping, where it is shown that the achievable secrecy rate increases logarithmically with the number of transmit antennas. However, the eavesdropper can be active and attack the training phase of the legitimate transmitter. As a consequence, this dramatically reduces the achievable secrecy rate. The second contribution of this study is a simple protocol that can effectively detect this attack so that a countermeasure can be taken. Closed-form expressions for the detection and false-alarm probabilities are derived. Moreover, the authors analyse the intercept probability and show that asymptotically exponential diversity is achieved.</description><identifier>ISSN: 1751-8628</identifier><identifier>ISSN: 1751-8636</identifier><identifier>EISSN: 1751-8636</identifier><identifier>DOI: 10.1049/iet-com.2015.0216</identifier><language>eng</language><publisher>The Institution of Engineering and Technology</publisher><subject>active eavesdroppers ; Asymptotic properties ; channel information ; channel properties ; channel state information ; Channels ; Computer information security ; confidential messages ; CSI ; Eavesdropping ; intercept probability ; large‐scale multiple‐input ; large‐scale multiple‐output ; legitimate receiver ; massive multiple‐input and multiple‐output system ; Mathematical analysis ; Messages ; MIMO communication ; MIMO system ; multiantennas eavesdropper ; passive eavesdropping ; physical layer security ; probability ; protocol ; protocols ; radio receivers ; Receivers ; secrecy rate ; TDD mode ; telecommunication security ; transmit antennas ; Transmitters ; wireless channels</subject><ispartof>IET communications, 2016-01, Vol.10 (1), p.50-56</ispartof><rights>The Institution of Engineering and Technology</rights><rights>2021 The Institution of Engineering and Technology</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c4017-718ce441192467ab451aaa71563811e4b8a3014d9b38f16632991fe5e979f1ad3</citedby><cites>FETCH-LOGICAL-c4017-718ce441192467ab451aaa71563811e4b8a3014d9b38f16632991fe5e979f1ad3</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktopdf>$$Uhttps://onlinelibrary.wiley.com/doi/pdf/10.1049%2Fiet-com.2015.0216$$EPDF$$P50$$Gwiley$$H</linktopdf><linktohtml>$$Uhttps://onlinelibrary.wiley.com/doi/full/10.1049%2Fiet-com.2015.0216$$EHTML$$P50$$Gwiley$$H</linktohtml><link.rule.ids>314,776,780,9735,11542,27903,27904,46030,46454</link.rule.ids><linktorsrc>$$Uhttps://onlinelibrary.wiley.com/doi/abs/10.1049%2Fiet-com.2015.0216$$EView_record_in_Wiley-Blackwell$$FView_record_in_$$GWiley-Blackwell</linktorsrc></links><search><creatorcontrib>Al-nahari, Azzam</creatorcontrib><title>Physical layer security using massive multiple-input and multiple-output: passive and active eavesdroppers</title><title>IET communications</title><description>Physical layer security is considered as a promising technique that exploits the channel properties in order to send confidential messages to the legitimate receiver even in the presence of a powerful eavesdropper and the absence of its channel information. In this study, the authors consider the effect of massive multiple-input and multiple-output (MMIMO) system operating in TDD mode in improving the physical layer security in the presence of multi-antennas eavesdropper. The channel state information (CSI) of the eavesdropper is assumed not known at the transmitter side, and also imperfect CSI of the legitimate receiver is assumed. The first important finding is that MMIMO is a valuable technique to combat passive eavesdropping, where it is shown that the achievable secrecy rate increases logarithmically with the number of transmit antennas. However, the eavesdropper can be active and attack the training phase of the legitimate transmitter. As a consequence, this dramatically reduces the achievable secrecy rate. The second contribution of this study is a simple protocol that can effectively detect this attack so that a countermeasure can be taken. Closed-form expressions for the detection and false-alarm probabilities are derived. Moreover, the authors analyse the intercept probability and show that asymptotically exponential diversity is achieved.</description><subject>active eavesdroppers</subject><subject>Asymptotic properties</subject><subject>channel information</subject><subject>channel properties</subject><subject>channel state information</subject><subject>Channels</subject><subject>Computer information security</subject><subject>confidential messages</subject><subject>CSI</subject><subject>Eavesdropping</subject><subject>intercept probability</subject><subject>large‐scale multiple‐input</subject><subject>large‐scale multiple‐output</subject><subject>legitimate receiver</subject><subject>massive multiple‐input and multiple‐output system</subject><subject>Mathematical analysis</subject><subject>Messages</subject><subject>MIMO communication</subject><subject>MIMO system</subject><subject>multiantennas eavesdropper</subject><subject>passive eavesdropping</subject><subject>physical layer security</subject><subject>probability</subject><subject>protocol</subject><subject>protocols</subject><subject>radio receivers</subject><subject>Receivers</subject><subject>secrecy rate</subject><subject>TDD mode</subject><subject>telecommunication security</subject><subject>transmit antennas</subject><subject>Transmitters</subject><subject>wireless channels</subject><issn>1751-8628</issn><issn>1751-8636</issn><issn>1751-8636</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2016</creationdate><recordtype>article</recordtype><recordid>eNqFkD1PwzAQhiMEEqXwA9gywpDiS5zE6QZVC5ValaGdLTe5gCvnAzsB5d_jKBUwgJh8Pj_P6fw6zjWQCRCa3ElsvLQqJj6BcEJ8iE6cEcQheCwKotOv2mfnzoUxB0LCMKJ05ByeXzsjU6FcJTrUrsG01bLp3NbI8sUthDHyHd2iVY2sFXqyrNvGFWX23araxvambn1k-0eRNn2J4h1Npqu6Rm0unbNcKINXx3Ps7Bbz7ezJW20el7P7lZdSArEXA0uRUoDEp1Es9jQEIUQMYRQwAKR7JgICNEv2AcshigI_SSDHEJM4yUFkwdi5GebWunpr0TS8kCZFpUSJVWs4MMLs9xkNLAoDmurKGI05r7UshO44EN7nym2u3ObK-1x5n6t1poPzIRV2_wt8tt75Dwt7JbGVbwe5xw5Vq0ubBF_Ot3y2Wf9w6iy3rPcL-_din-4rnNE</recordid><startdate>20160104</startdate><enddate>20160104</enddate><creator>Al-nahari, Azzam</creator><general>The Institution of Engineering and Technology</general><scope>AAYXX</scope><scope>CITATION</scope><scope>7SC</scope><scope>7SP</scope><scope>8FD</scope><scope>JQ2</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope></search><sort><creationdate>20160104</creationdate><title>Physical layer security using massive multiple-input and multiple-output: passive and active eavesdroppers</title><author>Al-nahari, Azzam</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c4017-718ce441192467ab451aaa71563811e4b8a3014d9b38f16632991fe5e979f1ad3</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2016</creationdate><topic>active eavesdroppers</topic><topic>Asymptotic properties</topic><topic>channel information</topic><topic>channel properties</topic><topic>channel state information</topic><topic>Channels</topic><topic>Computer information security</topic><topic>confidential messages</topic><topic>CSI</topic><topic>Eavesdropping</topic><topic>intercept probability</topic><topic>large‐scale multiple‐input</topic><topic>large‐scale multiple‐output</topic><topic>legitimate receiver</topic><topic>massive multiple‐input and multiple‐output system</topic><topic>Mathematical analysis</topic><topic>Messages</topic><topic>MIMO communication</topic><topic>MIMO system</topic><topic>multiantennas eavesdropper</topic><topic>passive eavesdropping</topic><topic>physical layer security</topic><topic>probability</topic><topic>protocol</topic><topic>protocols</topic><topic>radio receivers</topic><topic>Receivers</topic><topic>secrecy rate</topic><topic>TDD mode</topic><topic>telecommunication security</topic><topic>transmit antennas</topic><topic>Transmitters</topic><topic>wireless channels</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Al-nahari, Azzam</creatorcontrib><collection>CrossRef</collection><collection>Computer and Information Systems Abstracts</collection><collection>Electronics & Communications Abstracts</collection><collection>Technology Research Database</collection><collection>ProQuest Computer Science Collection</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><jtitle>IET communications</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Al-nahari, Azzam</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Physical layer security using massive multiple-input and multiple-output: passive and active eavesdroppers</atitle><jtitle>IET communications</jtitle><date>2016-01-04</date><risdate>2016</risdate><volume>10</volume><issue>1</issue><spage>50</spage><epage>56</epage><pages>50-56</pages><issn>1751-8628</issn><issn>1751-8636</issn><eissn>1751-8636</eissn><abstract>Physical layer security is considered as a promising technique that exploits the channel properties in order to send confidential messages to the legitimate receiver even in the presence of a powerful eavesdropper and the absence of its channel information. In this study, the authors consider the effect of massive multiple-input and multiple-output (MMIMO) system operating in TDD mode in improving the physical layer security in the presence of multi-antennas eavesdropper. The channel state information (CSI) of the eavesdropper is assumed not known at the transmitter side, and also imperfect CSI of the legitimate receiver is assumed. The first important finding is that MMIMO is a valuable technique to combat passive eavesdropping, where it is shown that the achievable secrecy rate increases logarithmically with the number of transmit antennas. However, the eavesdropper can be active and attack the training phase of the legitimate transmitter. As a consequence, this dramatically reduces the achievable secrecy rate. The second contribution of this study is a simple protocol that can effectively detect this attack so that a countermeasure can be taken. Closed-form expressions for the detection and false-alarm probabilities are derived. Moreover, the authors analyse the intercept probability and show that asymptotically exponential diversity is achieved.</abstract><pub>The Institution of Engineering and Technology</pub><doi>10.1049/iet-com.2015.0216</doi><tpages>7</tpages></addata></record> |
fulltext | fulltext_linktorsrc |
identifier | ISSN: 1751-8628 |
ispartof | IET communications, 2016-01, Vol.10 (1), p.50-56 |
issn | 1751-8628 1751-8636 1751-8636 |
language | eng |
recordid | cdi_crossref_primary_10_1049_iet_com_2015_0216 |
source | Wiley Online Library Open Access |
subjects | active eavesdroppers Asymptotic properties channel information channel properties channel state information Channels Computer information security confidential messages CSI Eavesdropping intercept probability large‐scale multiple‐input large‐scale multiple‐output legitimate receiver massive multiple‐input and multiple‐output system Mathematical analysis Messages MIMO communication MIMO system multiantennas eavesdropper passive eavesdropping physical layer security probability protocol protocols radio receivers Receivers secrecy rate TDD mode telecommunication security transmit antennas Transmitters wireless channels |
title | Physical layer security using massive multiple-input and multiple-output: passive and active eavesdroppers |
url | http://sfxeu10.hosted.exlibrisgroup.com/loughborough?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-24T17%3A30%3A22IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_24P&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Physical%20layer%20security%20using%20massive%20multiple-input%20and%20multiple-output:%20passive%20and%20active%20eavesdroppers&rft.jtitle=IET%20communications&rft.au=Al-nahari,%20Azzam&rft.date=2016-01-04&rft.volume=10&rft.issue=1&rft.spage=50&rft.epage=56&rft.pages=50-56&rft.issn=1751-8628&rft.eissn=1751-8636&rft_id=info:doi/10.1049/iet-com.2015.0216&rft_dat=%3Cproquest_24P%3E1808055843%3C/proquest_24P%3E%3Cgrp_id%3Ecdi_FETCH-LOGICAL-c4017-718ce441192467ab451aaa71563811e4b8a3014d9b38f16632991fe5e979f1ad3%3C/grp_id%3E%3Coa%3E%3C/oa%3E%3Curl%3E%3C/url%3E&rft_id=info:oai/&rft_pqid=1808055843&rft_id=info:pmid/&rfr_iscdi=true |