Pilot contamination for active eavesdropping

X Zhou, B Maham, A Hjorungnes - IEEE Transactions on …, 2012 - ieeexplore.ieee.org
Existing studies on physical layer security often assume the availability of perfect channel
state information (CSI) and overlook the importance of channel training needed for obtaining …

Proactive eavesdropping via jamming for rate maximization over Rayleigh fading channels

J Xu, L Duan, R Zhang - IEEE Wireless Communications …, 2015 - ieeexplore.ieee.org
This letter proposes a paradigm shift in wireless security from preventing conventional
eavesdropping attacks to a new legitimate surveillance objective by studying how a …

Cell-free massive MIMO networks: Optimal power control against active eavesdropping

TM Hoang, HQ Ngo, TQ Duong… - IEEE Transactions …, 2018 - ieeexplore.ieee.org
This paper studies the security aspect of a recently introduced “cell-free massive MIMO”
network under a pilot spoofing attack. First, a simple method to recognize the presence of …

Jamming games in the MIMO wiretap channel with an active eavesdropper

A Mukherjee, AL Swindlehurst - IEEE Transactions on Signal …, 2012 - ieeexplore.ieee.org
This paper investigates reliable and covert transmission strategies in a multiple-input
multiple-output (MIMO) wiretap channel with a transmitter, receiver and an adversarial …

Robust resource allocation to enhance physical layer security in systems with full-duplex receivers: Active adversary

MR Abedi, N Mokari, H Saeedi… - IEEE Transactions on …, 2016 - ieeexplore.ieee.org
We propose a robust resource allocation framework to improve the physical layer security in
the presence of an active eavesdropper. In the considered system, we assume that both …

Jamming-assisted eavesdropping over parallel fading channels

Y Han, L Duan, R Zhang - IEEE transactions on information …, 2019 - ieeexplore.ieee.org
Unlike passive eavesdropping, proactive eavesdropping is recently proposed to use
jamming to moderate a suspicious link's communication rate for facilitating simultaneous …

Optimization-based access assignment scheme for physical-layer security in D2D communications underlaying a cellular network

L Wang, J Liu, M Chen, G Gui… - IEEE Transactions on …, 2018 - ieeexplore.ieee.org
In this paper, we consider physical-layer security for device-to-device (D2D)
communications underlaying cellular networks in which cellular users are under threat from …

MIMO secret communications against an active eavesdropper

L Li, AP Petropulu, Z Chen - IEEE Transactions on Information …, 2017 - ieeexplore.ieee.org
This paper considers a scenario in which an Alice-Bob pair wishes to communicate in secret
in the presence of an active Eve, who is capable of jamming as well as eavesdropping and …

Full-duplex cyber-weapon with massive arrays

NP Nguyen, HQ Ngo, TQ Duong… - IEEE Transactions …, 2017 - ieeexplore.ieee.org
In order to enhance secrecy performance of protecting scenarios, understanding the
illegitimate side is crucial. In this paper, from the perspective of the illegitimate side, the …

Proactive attack: A strategy for legitimate eavesdropping

H Tran, HJ Zepernick - 2016 IEEE Sixth International …, 2016 - ieeexplore.ieee.org
In this paper, we study a novel approach to eavesdrop the messages of suspicious users for
a surveillance purpose. In particular, we consider a scenario in which the legitimate monitor …