2015 IEEE Globecom Workshops (GC Wkshps) 2015
DOI: 10.1109/glocomw.2015.7414040
|View full text |Cite
|
Sign up to set email alerts
|

Secret Key Agreement for Massive MIMO Systems with Two-Way Training under Pilot Contamination Attack

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
4
0

Year Published

2016
2016
2022
2022

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 9 publications
(4 citation statements)
references
References 19 publications
0
4
0
Order By: Relevance
“…With reasonable encryption and computational costs, such communication is possible. Additionally, taking advantage of the physical uniform characteristics of channel state information (CSI) we can generate secure and unique keys for each edge device within a network [26,27,28], using the received signal strength (RSS) [29,30] or direct information [31]. We can generate and disseminate secure keys that are extensible for physical layer authentication [32,33,34].…”
Section: Existing 5g Security Approachesmentioning
confidence: 99%
“…With reasonable encryption and computational costs, such communication is possible. Additionally, taking advantage of the physical uniform characteristics of channel state information (CSI) we can generate secure and unique keys for each edge device within a network [26,27,28], using the received signal strength (RSS) [29,30] or direct information [31]. We can generate and disseminate secure keys that are extensible for physical layer authentication [32,33,34].…”
Section: Existing 5g Security Approachesmentioning
confidence: 99%
“…The idea of exploiting wireless channel characteristics for generating secret keys has received considerable attention in recent years. A variety of LSB PHY-layer key extraction schemes has been proposed, e.g,, [10], [11], [12], [13], [14], [15], [16]. While the security of LSB key extraction relies heavily on the uncorrelation assumption of channels, the validity of this assumption has not been evaluated/verified in these works.…”
Section: Related Workmentioning
confidence: 99%
“…ACKNOWLEDGMENT This research work is partially supported by the National Science Foundation under Grants CNS-1837034, CNS- 13 1745254, CNS-1659965, CNS-1659962, CNS-1460897 and DGE-1623713. Any opinions, findings, and conclusions or recommendations expressed in this material are those of the authors and do not necessarily reflect the views of the National Science Foundation.…”
mentioning
confidence: 99%
“…Throughout the literature, to the best of the authors' knowledge, the optimized transmission for a SWIPT system with pilot spoofing attack has not been considered. However, there has been research that explores new signal processing methods to enhance the information-secrecy in the presence of a pilot spoofing attack [1], [3]- [9]. The recently developed signal processing algorithms consider recovering network security either by: 1) improving the processing of the signal (which might include the information and/or artificial noise (AN)) transmission [1], [3]- [7]; 2) or by improving both the processing of the signal and the training sequence transmission [8], [9].…”
Section: Introductionmentioning
confidence: 99%