Detecting malicious pilot contamination in multiuser massive MIMO using decision trees

IF 1.7 4区 计算机科学 Q3 TELECOMMUNICATIONS Telecommunication Systems Pub Date : 2024-06-03 DOI:10.1007/s11235-024-01163-0
Pedro Ivo da Cruz, Dimitri Leandro, Tito Spadini, Ricardo Suyama, Murilo Bellezoni Loiola
{"title":"Detecting malicious pilot contamination in multiuser massive MIMO using decision trees","authors":"Pedro Ivo da Cruz, Dimitri Leandro, Tito Spadini, Ricardo Suyama, Murilo Bellezoni Loiola","doi":"10.1007/s11235-024-01163-0","DOIUrl":null,"url":null,"abstract":"<p>Massive multiple-input multiple-output (MMIMO) is essential to modern wireless communication systems, like 5G and 6G, but it is vulnerable to active eavesdropping attacks. One type of such attack is the pilot contamination attack (PCA), where a malicious user copies pilot signals from an authentic user during uplink, intentionally interfering with the base station’s (BS) channel estimation accuracy. In this work, we propose to use a Decision Tree (DT) algorithm for PCA detection at the BS in a multi-user system. We present a methodology to generate training data for the DT classifier and select the best DT according to their depth. Then, we simulate different scenarios that could be encountered in practice and compare the DT to a classical technique based on likelihood ratio testing (LRT) submitted to the same scenarios. The results revealed that a DT with only one level of depth is sufficient to outperform the LRT. The DT shows a good performance regarding the probability of detection in noisy scenarios and when the malicious user transmits with low power, in which case the LRT fails to detect the PCA. We also show that the reason for the good performance of the DT is its ability to compute a threshold that separates PCA data from non-PCA data better than the LRT’s threshold. Moreover, the DT does not necessitate prior knowledge of noise power or assumptions regarding the signal power of malicious users, prerequisites typically essential for LRT and other hypothesis testing methodologies.</p>","PeriodicalId":51194,"journal":{"name":"Telecommunication Systems","volume":"4586 1 1","pages":""},"PeriodicalIF":1.7000,"publicationDate":"2024-06-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Telecommunication Systems","FirstCategoryId":"94","ListUrlMain":"https://doi.org/10.1007/s11235-024-01163-0","RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q3","JCRName":"TELECOMMUNICATIONS","Score":null,"Total":0}
引用次数: 0

Abstract

Massive multiple-input multiple-output (MMIMO) is essential to modern wireless communication systems, like 5G and 6G, but it is vulnerable to active eavesdropping attacks. One type of such attack is the pilot contamination attack (PCA), where a malicious user copies pilot signals from an authentic user during uplink, intentionally interfering with the base station’s (BS) channel estimation accuracy. In this work, we propose to use a Decision Tree (DT) algorithm for PCA detection at the BS in a multi-user system. We present a methodology to generate training data for the DT classifier and select the best DT according to their depth. Then, we simulate different scenarios that could be encountered in practice and compare the DT to a classical technique based on likelihood ratio testing (LRT) submitted to the same scenarios. The results revealed that a DT with only one level of depth is sufficient to outperform the LRT. The DT shows a good performance regarding the probability of detection in noisy scenarios and when the malicious user transmits with low power, in which case the LRT fails to detect the PCA. We also show that the reason for the good performance of the DT is its ability to compute a threshold that separates PCA data from non-PCA data better than the LRT’s threshold. Moreover, the DT does not necessitate prior knowledge of noise power or assumptions regarding the signal power of malicious users, prerequisites typically essential for LRT and other hypothesis testing methodologies.

Abstract Image

查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
利用决策树检测多用户大规模多输入多输出(MIMO)中的恶意先导污染
大规模多输入多输出(MMIMO)对 5G 和 6G 等现代无线通信系统至关重要,但它很容易受到主动窃听攻击。其中一种攻击是先导污染攻击(PCA),即恶意用户在上行链路中复制真实用户的先导信号,故意干扰基站(BS)的信道估计精度。在这项工作中,我们建议在多用户系统中使用决策树(DT)算法在基站进行 PCA 检测。我们提出了一种为 DT 分类器生成训练数据并根据其深度选择最佳 DT 的方法。然后,我们模拟了在实践中可能遇到的不同场景,并将 DT 与基于似然比测试 (LRT) 的经典技术进行了比较。结果表明,只有一级深度的 DT 就足以超越 LRT。在嘈杂场景和恶意用户低功率传输时,DT 的检测概率表现良好,而在这种情况下,LRT 无法检测到 PCA。我们还表明,DT 性能良好的原因在于它能计算出一个阈值,该阈值能比 LRT 的阈值更好地将 PCA 数据与非 PCA 数据区分开来。此外,DT 不需要事先了解噪声功率,也不需要假设恶意用户的信号功率,而这些先决条件通常是 LRT 和其他假设检验方法所必需的。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
Telecommunication Systems
Telecommunication Systems 工程技术-电信学
CiteScore
5.40
自引率
8.00%
发文量
105
审稿时长
6.0 months
期刊介绍: Telecommunication Systems is a journal covering all aspects of modeling, analysis, design and management of telecommunication systems. The journal publishes high quality articles dealing with the use of analytic and quantitative tools for the modeling, analysis, design and management of telecommunication systems covering: Performance Evaluation of Wide Area and Local Networks; Network Interconnection; Wire, wireless, Adhoc, mobile networks; Impact of New Services (economic and organizational impact); Fiberoptics and photonic switching; DSL, ADSL, cable TV and their impact; Design and Analysis Issues in Metropolitan Area Networks; Networking Protocols; Dynamics and Capacity Expansion of Telecommunication Systems; Multimedia Based Systems, Their Design Configuration and Impact; Configuration of Distributed Systems; Pricing for Networking and Telecommunication Services; Performance Analysis of Local Area Networks; Distributed Group Decision Support Systems; Configuring Telecommunication Systems with Reliability and Availability; Cost Benefit Analysis and Economic Impact of Telecommunication Systems; Standardization and Regulatory Issues; Security, Privacy and Encryption in Telecommunication Systems; Cellular, Mobile and Satellite Based Systems.
期刊最新文献
Next-cell prediction with LSTM based on vehicle mobility for 5G mc-IoT slices Secure positioning of wireless sensor networks against wormhole attacks Safeguarding the Internet of Health Things: advancements, challenges, and trust-based solution Optimized task offloading for federated learning based on β-skeleton graph in edge computing Noise robust automatic speaker verification systems: review and analysis
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1