Autors: Mihaylova, D. A., Iliev, G. L., Valkova-Jarvis, Z. V., Stoynov, V. R. Title: Pilot Contamination Attack Detection Methods—An Exhaustive Performance Evaluation Through Probability Metrics and Statistical Classification Parameters Keywords: binary classification, physical layer security, pilot contamination attack, statistical evaluationAbstract: Among the numerous strategies that an attacker can initiate to enhance its eavesdropping capabilities is the Pilot Contamination Attack (PCA). Two promising methods, based on Phase-Shift Keying (PSK) modulation of Nth order—2-N-PSK and Shifted 2-N-PSK, can detect an existing PCA by means of analysis of the constellation that the correlation product of received pilot signals belongs to. The overall efficiency of the methods can be studied by the most commonly used probability metrics—detection probability and false alarm probability. However, this information may be insufficient for comparison purposes; therefore, to acquire a more holistic perspective on the methods’ performances, statistical evaluation metrics can be obtained. Depending on the particular application of the system in which the PCA detection methods are incorporated and the distribution of attack initiation among all samples, different classification parameters are of varying significance in the efficiency assessment. In this paper, 2-N-PSK and Shifted 2-N-PSK are comprehensively studied through their probability parameters. In addition, the methods are also compared by their most informative statistical parameters, such as accuracy, precision and recall, F1-score, specificity, and fall-out. A large number of simulations are carried out, the analyses of which indisputably prove the superior behavior of the Shifted 2-N-PSK compared to the 2-N-PSK detection method. Since a method’s performance is strongly related to the number of antenna elements at the base station, all simulations are conducted for scenarios with different antennae numbers. The most promising realization of Shifted 2-N-PSK improves the receiver operating characteristics results of the original 2-N-PSK by 7.38%, 4.33%, and 5.61%, and outperforms the precision recall analyses of 2-N-PSK by 10.02%, 4.82% and 3.86%, for the respective number of 10, 100 and 300 antenna elements at the base station. References - Shannon C.E. Communication theory of secrecy systems Bell Syst. Tech. J. 1949 28 656 715 10.1002/j.1538-7305.1949.tb00928.x
- Wyner A.D. The wire-tap channel Bell Syst. Tech. J. 1975 54 1355 1387 10.1002/j.1538-7305.1975.tb02040.x
- Zhang S. Zhu D. Liu Y. Artificial intelligence empowered physical layer security for 6G: State-of-the-art, challenges, and opportunities Comput. Netw. 2024 242 110255 10.1016/j.comnet.2024.110255
- Busari S.A. Huq K.M.S. Mumtaz S. Rodriguez J. Terahertz Massive MIMO for Beyond-5G Wireless Communication Proceedings of the IEEE International Conference on Communications (ICC) Shanghai, China 20–24 May 2019 10.1109/ICC.2019.8761371
- Zhou X. Maham B. Hjorungnes A. Pilot contamination for active eavesdropping IEEE Trans. Wirel. Commun. 2012 11 903 907 10.1109/TWC.2012.020712.111298
- Elijah O. Leow C.Y. Rahman T.A. Nunoo S. Iliya S.Z. A comprehensive survey of pilot contamination in massive MIMO—5G system IEEE Commun. Surv. Tutor. 2016 18 905 923 10.1109/COMST.2015.2504379
- Xu W. Yuan C. Xu S. Ngo H.Q. Xiang W. On pilot spoofing attack in massive MIMO systems: Detection and countermeasure IEEE Trans. Inf. Forensics Secur. 2021 16 1396 1409 10.1109/TIFS.2020.3036805
- Xu S. Xu W. Gan H. Li B. Detection of pilot spoofing attack in massive MIMO systems based on channel estimation Signal Process. 2020 169 107411 10.1016/j.sigpro.2019.107411
- Tugnait J.K. Self-contamination for detection of pilot contamination attack in multiple antenna systems IEEE Wirel. Commun. Lett. 2015 4 525 528 10.1109/LWC.2015.2451638
- Xiong Q. Liang Y.-C. Li K.H. Gong Y. Han S. Secure transmission against pilot spoofing attack: A two-way training-based scheme IEEE Trans. Inf. Forensics Secur. 2016 11 1017 1026 10.1109/TIFS.2016.2516825
- Zeng J. Wang D. Xu W. Li B. An efficient detection algorithm of pilot spoofing attack in massive MIMO systems Signal Process. 2021 182 107962 10.1016/j.sigpro.2021.107962
- Qiu J. Xu K. Xia X. Shen Z. Xie W. Zhang D. Wang W. Secure transmission scheme based on fingerprint positioning in cell-free massive MIMO systems IEEE Trans. Signal Inf. Process. Over Netw. 2022 8 92 105 10.1109/TSIPN.2022.3149112
- Darsena D. Gelli G. Iudice I. Verde F. Design and performance analysis of channel estimators under pilot spoofing attacks in multiple-antenna systems IEEE Trans. Inf. Forensics Secur. 2020 15 3255 3269 10.1109/TIFS.2020.2985548
- Wang H.-M. Huang K.-W. Tsiftsis T.A. Multiple antennas secure transmission under pilot spoofing and jamming attack IEEE J. Sel. Areas Commun. 2018 36 860 876 10.1109/JSAC.2018.2825148
- Kapetanović D. Zheng G. Wong K.-K. Ottersten B. Detection of Pilot Contamination Attack Using Random Training and Massive MIMO Proceedings of the IEEE 24th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC) London, UK 8–11 September 2013 10.1109/PIMRC.2013.6666096
- Mihaylova D. Valkova-Jarvis Z. Iliev G. Poulkov V. Shifted 2-N-PSK method for the detection of pilot contamination attacks Wirel. Pers. Commun. 2021 118 1945 1970 10.1007/s11277-019-06341-x
- Mihaylova D. Stoynov V. Iliev G. Valkova-Jarvis Z. Poulkov V. Performance Evaluation of Constellation Diagram Analysis-based Methods for PCA Detection Proceedings of the 29th National Conference with International Participation (TELECOM) Sofia, Bulgaria 28–29 October 2021 10.1109/TELECOM53156.2021.9659694
- Song J. Wang X. He M. Jin L. CSK-CNN: Network intrusion detection model based on two-layer convolution neural network for handling imbalanced dataset Information 2023 14 130 10.3390/info14020130
- Alkhudaydi O.A. Krichen M. Alghamdi A.D. A deep learning methodology for predicting cybersecurity attacks on the Internet of Things Information 2023 14 550 10.3390/info14100550
- Charmanas K. Mittas N. Angelis L. Exploitation of vulnerabilities: A topic-based machine learning framework for explaining and predicting exploitation Information 2023 14 403 10.3390/info14070403
- Almseidin M. Alzubi M. Kovacs S. Alkasassbeh M. Evaluation of Machine Learning Algorithms for Intrusion Detection System Proceedings of the IEEE 15th International Symposium on Intelligent Systems and Informatics (SISY) Subotica, Serbia 14–16 September 2017 10.1109/SISY.2017.8080566
- Rashid A. Siddique M.J. Ahmed S.M. Machine and Deep Learning Based Comparative Analysis Using Hybrid Approaches for Intrusion Detection System Proceedings of the 3rd International Conference on Advancements in Computational Sciences (ICACS) Lahore, Pakistan 17–19 February 2020 10.1109/ICACS47775.2020.9055946
- Brownlee J. Imbalanced Classification with Python: Better Metrics, Balance Skewed Classes, Cost-Sensitive Learning 1st ed. Independently published by Machine Learning Mastery Vermont, VIC, Australia 2020 35 85 979-8468452240
- Branco P. Torgo L. Ribeiro R. A survey of predictive modeling on imbalanced domains ACM Comput. Surv. 2016 49 31 10.1145/2907070
- Kamaldeep Dutta M. Granjal J. Towards a secure internet of things: A comprehensive study of second line defense mechanisms IEEE Access 2020 8 127272 127312 10.1109/ACCESS.2020.3005643
- Mihaylova D. Valkova-Jarvis Z. Iliev G. Stoynov V. Statistical Evaluation of Classification Models for PCA Detection Proceedings of the 4th International Conference on Communications, Information, Electronic and Energy Systems (CIEES 2023) Plovdiv, Bulgaria 23–25 November 2023 10.1109/CIEES58940.2023.10378840
- Mukherjee A. Physical-Layer Security in the Internet of Things: Sensing and Communication Confidentiality Under Resource Constraints Proc. IEEE 2015 103 1747 1761 10.1109/JPROC.2015.2466548
- Rojas P. Alahmadi S. Bayoumi M. Physical Layer Security for IoT Communications—A Survey Proceedings of the 2021 IEEE 7th World Forum on Internet of Things (WF-IoT) New Orleans, LA, USA 14 June–31 July 2021 10.1109/WF-IoT51360.2021.9595025
Issue
| Mathematics, vol. 12, pp. Article number 3524, 2024, , https://doi.org/10.3390/math12223524 |
|