2013 International Conference on ICT Convergence (ICTC) 2013
DOI: 10.1109/ictc.2013.6675552
|View full text |Cite
|
Sign up to set email alerts
|

Robustness of secret key agreement protocol with massive MIMO under pilot contamination attack

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
8
0

Year Published

2015
2015
2023
2023

Publication Types

Select...
4
3

Relationship

1
6

Authors

Journals

citations
Cited by 8 publications
(8 citation statements)
references
References 13 publications
0
8
0
Order By: Relevance
“…As a performance benchmark, we also plot the upper bound onP out (w k , δ) by introducing another upper bound on the Marcum Q-function: (28): where erfc(x) = 1 π ∞ x exp −t 2 dt. Note that although the bound in (35) is less insightful than that in (30), it provides a tighter upper bound than that in (30) [51], [52]. Fig.…”
Section: B Average Secrecy Outage Probabilitymentioning
confidence: 92%
See 2 more Smart Citations
“…As a performance benchmark, we also plot the upper bound onP out (w k , δ) by introducing another upper bound on the Marcum Q-function: (28): where erfc(x) = 1 π ∞ x exp −t 2 dt. Note that although the bound in (35) is less insightful than that in (30), it provides a tighter upper bound than that in (30) [51], [52]. Fig.…”
Section: B Average Secrecy Outage Probabilitymentioning
confidence: 92%
“…Meanwhile, the work in [34] proposed a PCA detection technique which employs random pilots from a set of phaseshift keying symbols. In [35], an SKA protocol under potential PCA was proposed and evaluated. However, the SKA protocol in [35] is inefficient in the sense that the protocol requires multiple coherence blocks and simply discards suspicious packets.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…When the number of antennas at the BS is large, it is impractical to estimate the downlink CSI at the user terminal side. Besides, eavesdroppers may utilize the pilot contamination attack [ 43 ], where the eavesdropper transmits the same pilot signals as the legitimate user. Then, the BS obtains the summation of the channel legitimate user and that of the eavesdropper, impacting the reciprocity of the channel observations of the BS and user terminals.…”
Section: Crkg In Massive Mimo and Mmwave Systemsmentioning
confidence: 99%
“…Then, the BS and user terminals can estimate their effective channel matrices with low dimensions, containing the dominant channel path information. For the pilot contamination attack, there exists a crucial complementary relation between the received signal strengths at the eavesdropper and the legitimate user [ 43 ]. This relation can measure the amount of information leakage to the eavesdropper and a rate-adaptation scheme is proposed.…”
Section: Crkg In Massive Mimo and Mmwave Systemsmentioning
confidence: 99%