报告题目:Pilot Spoofing Attack in Massive MIMO Systems
报 告 人:Dr Ying-Chang Liang, Fellow, IEEE; Principal Scientist, Institute for Infocomm Research, Singapore
国家特聘教授
主 持 人:赵晓晖 教授,博士导师
报告地点:beat365网站南湖校区一教304学术报告厅
报告时间:2016年1月11号下午13:30—15:30
主办单位:beat365
承办单位:通信工程系
欢迎广大师生踊跃参加!
报告内容简介:
The pilot spoofing attack is one kind of active eavesdropping conducted by a malicious user during the channel estimation phase of the legitimate transmission. In this attack, an intelligent adversary spoofs the transmitter on the estimation of channel state information (CSI) by sending the identical pilot signal as the legitimate receiver, in order to obtain a larger information rate in the data transmission phase. The pilot spoofing attack could also drastically weaken the strength of the received signal at the legitimate receiver if the adversary utilizes large enough power. Motivated by the serious problems the pilot spoofing attack could cause, we propose an efficient detector, named energy ratio detector (ERD), by exploring the asymmetry of received signal power levels at the transmitter and the legitimate receiver when there exists a pilot spoofing attack. We also propose solutions for recovering secure communications once such attack is identified.
附报告人简介:
Dr Ying-Chang Liang (F’11) is a Principal Scientist and Technical Advisor in the Institute for Infocomm Research (I2R), Singapore, and a Professor in the University of Electronic Science and Technology of China (UESTC), China. He was a visiting scholar in the Department of Electrical Engineering, Stanford University, CA, USA, from Dec 2002 to Dec 2003, and was an adjunct faculty in National University of Singapore and Nanyang Technological University from 2004