Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Filters








142 Hits in 4.4 sec

Jamming a TDD Point-to-Point Link Using Reciprocity-Based MIMO

Marcus Karlsson, Emil Bjornson, Erik G. Larsson
2017 IEEE Transactions on Information Forensics and Security  
We present a method for jamming a time-division duplex link using a transceiver with a large number of antennas.  ...  The jammer operates without any prior knowledge of channels to the legitimate transmitters, or the legitimate signals by relying on channel reciprocity.  ...  The initial idea of using a reciprocity-based MIMO jammer to attack a point-to-point TDD in [32] , in which we covered the frequency-flat case.  ... 
doi:10.1109/tifs.2017.2725823 fatcat:rgiy7gs6hfgrhdaja6jat53pva

5G green networking: Enabling technologies, potentials, and challenges

Kemal Davaslioglu, Richard D. Gitlin
2016 2016 IEEE 17th Annual Wireless and Microwave Technology Conference (WAMICON)  
We are in the midst of a major change in mobile wireless networks.  ...  However, this has lead to an energy inefficient network design.  ...  Massive MIMO, mmWave, and Small Cells Applications A fully synchronized TDD-based HetNet deployment in which a macrocell base station employs massive MIMO with an underlay of small cell deployments using  ... 
doi:10.1109/wamicon.2016.7483860 fatcat:37wuie6psfaixnn65olvhwrue4

A Comparison of TDD and FDD Massive MIMO Systems Against Smart Jamming

Ashkan Sheikhi, S. Mohammad Razavizadeh, Inkyu Lee
2020 IEEE Access  
Our results show that despite more attention to the TDD mode in current massive MIMO systems, it is more vulnerable to smart jamming attacks compared to the FDD mode which results in a smaller SE-gap between  ...  Furthermore, a countermeasure technique is proposed to combat this jamming attack in both the TDD and FDD modes by estimating the jamming power, grouping users, and allocating power among them.  ...  In massive MIMO systems, a large number of antennas are used at the base stations (BSs) that serve low-complexity user equipments (UEs) [1] .  ... 
doi:10.1109/access.2020.2987606 fatcat:4rznhkihdbfqlnou36lbcyoiuu

Massive MIMO as a cyber-weapon

Marcus Karlsson, Erik G. Larsson
2014 2014 48th Asilomar Conference on Signals, Systems and Computers  
BACKGROUND Massive MIMO refers to using large numbers, a hundred or more, of phase-coherently operating antennas at a wireless base station.  ...  Abstract-A scheme for a multi-antenna jammer, jamming a SISO primary link working in TDD mode is presented.  ... 
doi:10.1109/acssc.2014.7094529 dblp:conf/acssc/KarlssonL14 fatcat:otc7tzxjcndntertgzy245yheu

Review Of The Pilot Contamination Problem For Massive Mimo And Possible Solution

Atul Kumar Mishra*, Prof. Saurabh Gaur
2016 Zenodo  
The use of MIMO for wireless data transmission has proven itself for enhancing the capacity of data transmission. The mobile network based on the cell structure also uses the MIMO techniques.  ...  Further research in the field of massive MIMO has started for faithful data transmission. The enhancement by massive MIMO encounters many problems related to the implementation.  ...  Furthermore, we showed how the macro base station (BS) can leverage the reciprocity-based interference covariance matrix information to significantly improve the SC throughput in a reverse-TDD mode.  ... 
doi:10.5281/zenodo.57041 fatcat:cbmvgaoa4vd2bpxebhcrxe6r3e

Massive MIMO for next generation wireless systems

Erik G. Larsson, Ove Edfors, Fredrik Tufvesson, Thomas L. Marzetta
2014 IEEE Communications Magazine  
Multi-user Multiple-Input Multiple-Output (MIMO) offers big advantages over conventional point-to-point MIMO: it works with cheap single-antenna terminals, a rich scattering environment is not required  ...  Other benefits of massive MIMO include the extensive use of inexpensive low-power components, reduced latency, simplification of the media access control (MAC) layer, and robustness to intentional jamming  ...  Acknowledgement The authors would like to thank Xiang Gao, doctoral student at Lund University, for her analysis of channel measurements presented in figures 6-7, and the Swedish organizations ELLIIT,  ... 
doi:10.1109/mcom.2014.6736761 fatcat:ck7fdjukvvdp7m5543clahl5v4

Joint Design of Massive MIMO Precoder and Security Scheme for Multiuser Scenarios under Reciprocal Channel Conditions

Gustavo Anjos, Daniel Castanheira, Adão Silva, Atílio Gameiro, Marco Gomes, João Vilela
2017 Wireless Communications and Mobile Computing  
These rotations use the phase of the reciprocal wireless channel as a common random source between the transmitter and the intended receiver.  ...  To assess the security performance, the proposed joint scheme is compared with a recently proposed approach for massive MIMO systems.  ...  The authors in [29] suggested a secrecy scheme that uses the reciprocal channel phase to randomly define discrete jamming signals.  ... 
doi:10.1155/2017/5396092 fatcat:ekwrr3l72rep5ppcycgqckjcyu

MIMO Cross-Layer Secure Communication Algorithm for Cyber Physical Systems Based on Interference Strategies

Yukai Hao, Xin Qiu
2020 IEEE Access  
sent to the macro base station via a wired backhaul.  ...  A machine learning algorithm is directly used to classify the channel difference or channel matrix to obtain the authentication results.  ...  For TDD systems, channel reciprocity can be used to estimate the channel characteristics of the downlink by transmitting training sequences on the uplink.  ... 
doi:10.1109/access.2020.3045482 fatcat:moxw2abfh5hs5hj4yjo76kgoaq

Protecting Physical Layer Secret Key Generation from Active Attacks

Miroslav Mitev, Arsenia Chorti, E. Veronica Belmega, H. Vincent Poor
2021 Entropy  
users to successfully reduce the injection attack to a less harmful jamming attack.  ...  In this paper, we investigate the impact of injection and jamming attacks during the advantage distillation in a multiple-input–multiple-output (MIMO) system.  ...  Next, we assume that Alice and Bob perform SKG in a TDD-MIMO system with a spatially uncorrelated channel.  ... 
doi:10.3390/e23080960 fatcat:pxgeo5jcsbgaxmiha3v45obkoy

RIS-Jamming: Breaking Key Consistency in Channel Reciprocity-based Key Generation [article]

Guyue Li, Paul Staat, Haoyu Li, Markus Heinrichs, Christian Zenger, Rainer Kronberger, Harald Elders-Boll, Christof Paar, Aiqun Hu
2024 arXiv   pre-print
Channel Reciprocity-based Key Generation (CRKG) exploits reciprocal channel randomness to establish shared secret keys between wireless terminals.  ...  We also experimentally demonstrate the RIS jamming attack by using commodity Wi-Fi devices in conjunction with a fabricated RIS prototype.  ...  In the attack, the reciprocal direct link between the legitimate parties is jammed by the RIS-induced link, effectively reducing reciprocity.  ... 
arXiv:2303.07015v2 fatcat:3yywwq6cvzc4tic3myywmeo67u

An Investigation of Using Loop-back Mechanism for Channel Reciprocity Enhancement in Secret Key Generation

Linning Peng, Guyue Li, Junqing Zhang, Roger Woods, Ming Liu, Aiqun Hu
2018 IEEE Transactions on Mobile Computing  
This paper investigates enhancing the channel reciprocity using a loop-back scheme with multiple frequency bands in time-division duplex (TDD) communication systems, in order to mitigate the effect of  ...  Physical layer security key generation exploits unpredictable features from wireless channels to achieve high security, which requires high reciprocity in order to set up symmetric keys between two users  ...  This paper presents a detailed investigation of using loop-back mechanism for TDD key extraction to improve the channel reciprocity.  ... 
doi:10.1109/tmc.2018.2842215 fatcat:fk5wmnirlfdzlmt7wp63tozd24

Energy Efficiency in Massive MIMO-Based 5G Networks: Opportunities and Challenges [article]

K. N. R. Surya Vara Prasad, Ekram Hossain, Vijay K. Bhargava
2015 arXiv   pre-print
In this regard, the massive multiple-input multiple-output (MIMO) technology, where the base stations (BSs) are equipped with a large number of antennas so as to achieve multiple orders of spectral and  ...  In this article, we present a comprehensive discussion on state-of-the-art techniques which further enhance the EE gains offered by massive MIMO (MM).  ...  While channel reciprocity can be exploited in TDD systems to derive near-optimal low-complexity linear precoding schemes, precoders for FDD systems cannot exploit channel reciprocity because the UL and  ... 
arXiv:1511.08689v1 fatcat:24bsaeje2zcwnox5vqisvhxzme

A New Frontier for IoT Security Emerging From Three Decades of Key Generation Relying on Wireless Channels

Junqing Zhang, Guyue Li, Alan Marshall, Aiqun Hu, Lajos Hanzo
2020 IEEE Access  
ACKNOWLEDGEMENTS We would like to thank Mr Yan Wang for his hard work implementing the key generation demonstration system during his final year project.  ...  These aspects will be linked to each other. A.  ...  Key generation meets different challenges when it is applied to practical communication systems operating in these modes. 1) TDD Mode TDD refers to duplex communication links, where the uplink is separated  ... 
doi:10.1109/access.2020.3012006 fatcat:yqlhgsxfjvdwvfo2jcvxxzhj2i

5G-Advanced Towards 6G: Past, Present, and Future [article]

Wanshi Chen, Xingqin Lin, Juho Lee, Antti Toskala, Shu Sun, Carla Fabiana Chiasserini, Lingjia Liu
2023 arXiv   pre-print
mobile broadband evolution and further vertical domain expansion and accommodating both immediate and long-term commercial needs. 5G-Advanced will significantly expand 5G capabilities, address many new use  ...  deployments. 3GPP is now entering the second phase of 5G standardization, known as 5G-Advanced, built on the 5G baseline in 3GPP Releases 15, 16, and 17. 3GPP Release 18, the start of 5G-Advanced, includes a  ...  point and a reception point.  ... 
arXiv:2303.07456v1 fatcat:ytrkustgxrbhreyyyc3csbkv7e

Secret Key Generation Schemes for Physical Layer Security

Megha S. Kumar, R. Ramanathan, M. Jayakumar, Devendra Kumar Yadav
2021 Defence Science Journal  
Physical layer security (PLS) has evolved to be a pivotal technique in ensuring secure wireless communication.  ...  The principle, procedure, techniques and performance metricesare investigated for PLSKG between a pair of users (PSKG) and for a group of users (GSKG).  ...  ACKNOWLEDGEMENT The authors would like to acknowledge the project support by EMR grant (ERIP/ER/201801009/M/01/1742) by ERIPR DRDO, New Delhi.  ... 
doi:10.14429/dsj.71.15403 fatcat:cbmi45bjyrhbhcstt57yl6bcoy
« Previous Showing results 1 — 15 out of 142 results