{"title":"一种基于移位星座的方法对抗先导污染攻击的检测能力","authors":"D. Mihaylova, Z. Valkova-Jarvis, G. Iliev","doi":"10.1109/RTUWO.2017.8228505","DOIUrl":null,"url":null,"abstract":"The implementation of channel estimation procedures in modern wireless networks exposes them to the risk of pilot contamination attacks. To protect the system from such types of malicious intervention, a recently proposed method, based on legitimate pilots from shifted constellations, can be applied. In this paper, the detection capability of this method is studied in both the presence and absence of noise. The results are compared to those of another method, where the legitimate pilots are not shifted from the original constellation.","PeriodicalId":183694,"journal":{"name":"2017 Advances in Wireless and Optical Communications (RTUWO)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":"{\"title\":\"Detection capabilities of a shifted constellation-based method against pilot contamination attacks\",\"authors\":\"D. Mihaylova, Z. Valkova-Jarvis, G. Iliev\",\"doi\":\"10.1109/RTUWO.2017.8228505\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The implementation of channel estimation procedures in modern wireless networks exposes them to the risk of pilot contamination attacks. To protect the system from such types of malicious intervention, a recently proposed method, based on legitimate pilots from shifted constellations, can be applied. In this paper, the detection capability of this method is studied in both the presence and absence of noise. The results are compared to those of another method, where the legitimate pilots are not shifted from the original constellation.\",\"PeriodicalId\":183694,\"journal\":{\"name\":\"2017 Advances in Wireless and Optical Communications (RTUWO)\",\"volume\":\"1 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2017-11-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"3\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2017 Advances in Wireless and Optical Communications (RTUWO)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/RTUWO.2017.8228505\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2017 Advances in Wireless and Optical Communications (RTUWO)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/RTUWO.2017.8228505","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Detection capabilities of a shifted constellation-based method against pilot contamination attacks
The implementation of channel estimation procedures in modern wireless networks exposes them to the risk of pilot contamination attacks. To protect the system from such types of malicious intervention, a recently proposed method, based on legitimate pilots from shifted constellations, can be applied. In this paper, the detection capability of this method is studied in both the presence and absence of noise. The results are compared to those of another method, where the legitimate pilots are not shifted from the original constellation.