2021
DOI: 10.1109/access.2021.3073115
|View full text |Cite
|
Sign up to set email alerts
|

Physical Layer Spoofing Attack Detection in MmWave Massive MIMO 5G Networks

Abstract: Identity spoofing attacks pose one of the most serious threats to wireless networks, where the attacker can masquerade as legitimate users by modifying its own identity. Channel-based physicallayer security is a promising technology to counter identity spoofing attacks. Although various channelbased security technologies have been proposed, the study of channel-based spoofing attack detection in 5G networks is largely open. This paper introduces a new channel-based spoofing attack detection scheme based on cha… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
14
0
1

Year Published

2021
2021
2024
2024

Publication Types

Select...
6
2
1

Relationship

0
9

Authors

Journals

citations
Cited by 35 publications
(15 citation statements)
references
References 35 publications
0
14
0
1
Order By: Relevance
“…In [266], the authors consider a mmWave MIMO scenario where channel characteristics are highly sensitive to spatial location. For this purpose, the authors propose a novel channel feature to improve the detection accuracy of mmWave MIMO networks.…”
Section: A Anti-spoofing Solutionsmentioning
confidence: 99%
“…In [266], the authors consider a mmWave MIMO scenario where channel characteristics are highly sensitive to spatial location. For this purpose, the authors propose a novel channel feature to improve the detection accuracy of mmWave MIMO networks.…”
Section: A Anti-spoofing Solutionsmentioning
confidence: 99%
“…For instance, it is still not clear that how does the sparse properties of mmWave channel can benefit the PLA detections and how to design the lightweight but effective detection criteria to achieve the desirable performance. Recently, works [21,22] utilized machine learning algorithms to "learn" the variations of sparsity of the mmWave channel, which can further improve the detection performance. However, utilizing such learning algorithms usually requires an additional training phase, which increases the overall delay and complexity.…”
Section: Motivations and Contributionsmentioning
confidence: 99%
“…Therefore, the complexity order of Algorithm 1 can be approximated as scriptOfalse(N2false)$\mathcal {O}(N^2)$. Based on the analysis above, in comparison to the machine leaning based schemes [21, 22], the complexity of Algorithm 1 is rather low.…”
Section: Authentication By Using Channel Sparsitymentioning
confidence: 99%
“…Gerrit et al [ 35 ] studied possible threats according to the STRIDE threat classification model and derive a risk matrix based on the likelihood and impact of 12 threat scenarios that affect the radio access and the network core. Sullivan et al [ 36 ] categorize security technologies using Open Systems Interconnection (OSI) layers and, for each layer, the authors discuss vulnerabilities, threats, security solutions, challenges, gaps, and open research issues. Weiwei et al [ 37 ] proposed a new channel-based spoofing attack detection scheme in millimeter-wave massive multiple-input multiple-output (mmWave-MIMO) 5G networks using channel virtual representation.…”
Section: Background and Related Workmentioning
confidence: 99%