EAGER: Detection and Mitigation of Pilot Contamination Attacks and Related Issues in Massive MIMO Systems

PI: J.K. Tugnait, 10/01/16 -- 9/30/19, $200,000.
Supported by the National Science Foundation Grant ECCS-1651133

Mobile data traffic continues to grow at an exponential rate. To meet this data challenge, massive MIMO (multiple-input multiple-output) system technology has recently been proposed where the base station employs a large number of antennas, allowing many users to be served simultaneously. It is regarded as one of the key enablers of future 5G wireless systems. While recent prototypes have demonstrated its feasibility, many significant research challenges remain to be addressed before massive MIMO can be deployed. Successful operation of massive MIMO depends critically on knowledge of the channel state information between the base station and the end users. In practice this would be acquired during the training phase where the users send individual pilot signals to the base station. This phase is challenging due to a large number of end users which leads to pilot reuse causing pilot contamination, and due to vulnerability to attacks by malicious eavesdroppers who may spoof legitimate users by transmitting identical pilot signals. This project is focused on methods to detect and defend against pilot contamination attacks.


Novel, innovative approaches to detect and defend against pilot contamination attacks from active eavesdroppers as well as from spoofing relays are investigated in this research. A key transformative idea introduced is that of self-contamination of pilot sequences by legitimate users to facilitate detection of active eavesdroppers. This project explores various ramifications of this idea in the context of the following research thrusts. (1) Detection of pilot contamination attacks by active eavesdroppers: Assuming the knowledge of the set of training sequences (and nothing else), can one detect if one or more training sequences are under attack? Source enumeration methods based on data correlation function are being exploited. (2) Joint acquisition of channel state information for both legitimate users and eavesdroppers to facilitate effective beamforming designs to enhance reception at legitimate users while degrading reception at eavesdroppers. (3) Detection and mitigation of active eavesdropping via spoofing relay attack where a spoofing relay operates in a full-duplex mode and simply amplifies and forwards the signal from a legitimate user to the base station in a time-division duplex uplink operation.



J.K. Tugnait, "Mitigation of pilot spoofing attack in frequency selective channels," to be presented at the 52nd Asilomar Conference on Signals, Systems and Computers, Pacific Grove, CA, Oct. 28 - Oct. 31, 2018.

J.K. Tugnait, "Detection of pilot spoofing attack over frequency selective channels," in Proc. 2018 IEEE Statistical Signal Processing Workshop (SSP), pp. 737-741, Freiburg, Germany, June 10-13, 2018.

J.K. Tugnait, "Pilot spoofing attack detection and countermeasure," IEEE Trans. Communications, vol. 66, no. 5, pp. 2093-2106, May 2018.

J.K. Tugnait, "On detection and mitigation of reused pilots in massive MIMO systems," IEEE Trans. Communications, vol. 66, no. 2, pp. 688-699, Feb. 2018.

J.K. Tugnait, "Pilot decontamination under imperfect power control," in Proc. 51st Asilomar Conference on Signals, Systems and Computers, pp. 1066-1070, Pacific Grove, CA, Oct. 29 - Nov. 1, 2017.

J.K. Tugnait, "Detection and mitigation of pilot spoofing attack," in Proc. 51st Asilomar Conference on Signals, Systems and Computers, pp. 1667-1671, Pacific Grove, CA, Oct. 29 - Nov. 1, 2017.

J.K. Tugnait, "Detection and identification of spoofed pilots in TDD/SDMA systems," IEEE Wireless Communications Letters, vol. 6, No. 4, pp. 550-553, Aug. 2017.

J.K. Tugnait, "On mitigation of active eavesdropping attack by spoofing relay," in Proc. 2017 IEEE 85th Vehicular Technology Conference: VTC2017-Spring, pp. 1-5, Sydney, Australia, June 4-7, 2017.

J.K. Tugnait, "On mitigation of pilot spoofing attack," in Proc. 2017 IEEE Intern. Conf. Acoustics, Speech & Signal Processing (ICASSP 2017), pp. 2097-2101, New Orleans, Louisiana, March 5-9, 2017.

J.K. Tugnait, "Detection of active eavesdropping attack by spoofing relay in multiple antenna systems," IEEE Wireless Communications Letters, vol. 5, pp. 460-463, Oct. 2016.


Author: Jitendra K. Tugnait: tugnajk@eng.auburn.edu

Date of latest revision: fri jul 20 2018