Abstract—Existing studies on physical layer security often assume the availability of perfect channel state information (CSI) and overlook the importance of channel training needed for obtaining the CSI. In this letter, we discuss how an active eavesdropper can attack the training phase in wireless communication to improve its eavesdropping performance. We derive a new security attack from the pilot contamination phenomenon, which targets at systems using reverse training to obtain the CSI at the transmitter for precoder design. This attack changes the precoder used by the legitimate transmitter in a controlled manner to strengthen the signal reception at the eavesdropper during data transmission. Furthermore, we discuss an efficient use of...
Discriminatory channel estimation (DCE) is a recently developed strategy to enlarge the performance ...
In this work, we consider secure communications in wireless multi-user (MU) multiple-input single-ou...
Physical layer security schemes for wireless communication systems have been broadly studied from an...
Abstract—Existing studies on physical layer security often assume the availability of perfect channe...
This work proposes a new channel training (CT) scheme for a full-duplex receiver to enhance physica...
peer reviewedChannel estimation attacks can degrade the performance of the legitimate system and fa...
In this work, we propose a new channel training (CT) scheme to enhance physical layer security in a ...
Raising concerns about the security of wireless communication led researchers develop new concepts t...
Physical layer security has recently been regarded as an emerging technique to complement and improv...
The broadcast nature of wireless medium has made information security as one of the most important a...
Physical layer security (PLS) technologies have attracted much attention in recent years for their p...
peer reviewedChannel estimation attacks can degrade the performance of the legitimate system and fac...
In this paper, a secure communication model for cognitive multi-user massive multiple-input multiple...
Wireless communications offer data transmission services anywhere and anytime, but with the inevitab...
Traditional approaches to wireless communication security (e.g., encryption) focus on maintaining th...
Discriminatory channel estimation (DCE) is a recently developed strategy to enlarge the performance ...
In this work, we consider secure communications in wireless multi-user (MU) multiple-input single-ou...
Physical layer security schemes for wireless communication systems have been broadly studied from an...
Abstract—Existing studies on physical layer security often assume the availability of perfect channe...
This work proposes a new channel training (CT) scheme for a full-duplex receiver to enhance physica...
peer reviewedChannel estimation attacks can degrade the performance of the legitimate system and fa...
In this work, we propose a new channel training (CT) scheme to enhance physical layer security in a ...
Raising concerns about the security of wireless communication led researchers develop new concepts t...
Physical layer security has recently been regarded as an emerging technique to complement and improv...
The broadcast nature of wireless medium has made information security as one of the most important a...
Physical layer security (PLS) technologies have attracted much attention in recent years for their p...
peer reviewedChannel estimation attacks can degrade the performance of the legitimate system and fac...
In this paper, a secure communication model for cognitive multi-user massive multiple-input multiple...
Wireless communications offer data transmission services anywhere and anytime, but with the inevitab...
Traditional approaches to wireless communication security (e.g., encryption) focus on maintaining th...
Discriminatory channel estimation (DCE) is a recently developed strategy to enlarge the performance ...
In this work, we consider secure communications in wireless multi-user (MU) multiple-input single-ou...
Physical layer security schemes for wireless communication systems have been broadly studied from an...