1. A Novel Pilot Spoofing Scheme via Intelligent Reflecting Surface Based on Statistical CSI
- Author
-
Feihu Wang, Kaizhi Huang, Lin Guo, Jie Yang, and Xinsheng Ji
- Subjects
Beamforming ,Spoofing attack ,Computer Networks and Communications ,business.industry ,Computer science ,ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS ,Real-time computing ,Aerospace Engineering ,Duplex (telecommunications) ,Eavesdropping ,Data_CODINGANDINFORMATIONTHEORY ,Channel state information ,Automotive Engineering ,Telecommunications link ,Wireless ,Electrical and Electronic Engineering ,business ,Secure transmission - Abstract
Pilot spoofing attack brings new challenges to physical layer secure transmission. However, this method will not work without any knowledge about the pilot sequence and active eavesdropping can be detected by constructing random pilot sequence. Intelligent reflecting surface (IRS), with the real-time programmable features for wireless channels, provides new possibilities for effective pilot spoofing. In this paper, the IRS is deployed near the legitimate users and the legitimate signal can always be passively reflected. Then the control strategy is embedded into the communication process under time-division duplex mode to assist eavesdroppers to conduct pilot spoofing. By setting different phase shifts at the IRS during the uplink phase and downlink phase, the channel reciprocity disappears, and thus secure beamforming vector is biased towards the eavesdropper. Furthermore, in order to overhear more information, the average secrecy rate minimization problem based on statistical channel state information is established by carefully designing the phase shifts, which is non-trivial to solve. With alternating optimization and Charnes-Cooper transformation technique, the original problem is transformed into convex form and a near optimal solution is achieved. Finally, simulation results show that our proposed scheme can pose serious secure threat without any energy footprint. What's more, if the IRS is not utilized by the internal users properly, it will bring more threat.
- Published
- 2021