July 10, 2018

Physical Layer Security in TDD Massive MIMO

  • Ashikhmin A.
  • Basciftci Y.
  • Koksal C.

IEEE We consider a single-cell downlink time division duplex (TDD) based massive MIMO communication in the presence of an adversary capable of jamming and eavesdropping simultaneously. We show that massive MIMO communication is naturally resilient to no training-phase jamming attack in which the adversary jams only the data communication and eavesdrops both the data communication and the training. Specifically, we show that the secure degrees of freedom (SDoF) attained in the presence of such an attack is identical to the maximum degrees of freedom (DoF) attainable under no attack. Further, we evaluate the number of base station (BS) antennas necessary in order to establish information theoretic security without even a need for Wyner encoding for a given rate of information leakage to the attacker. Next, we show that things are completely different once the adversary starts jamming the training phase. Specifically, we consider pilot contamination attack, called training-phase jamming in which the adversary jams and eavesdrops both the training and the data communication. We show that under such an attack, the maximum achieved SDoF is identical to zero. Furthermore, the maximum achievable secure rates of users also vanish, even in the asymptotic regime in the number of BS antennas. We finally address this attack and show that, under training-phase jamming, if the number of pilot signals is scaled in a certain way and the pilot signal assignments can be hidden from the adversary, the users achieve a SDoF identical to the maximum achievable DoF under no attack.

View Original Article

Recent Publications

August 09, 2017

A Cloud Native Approach to 5G Network Slicing

  • Francini A.
  • Miller R.
  • Sharma S.

5G networks will have to support a set of very diverse and often extreme requirements. Network slicing offers an effective way to unlock the full potential of 5G networks and meet those requirements on a shared network infrastructure. This paper presents a cloud native approach to network slicing. The cloud ...

August 01, 2017

Modeling and simulation of RSOA with a dual-electrode configuration

  • De Valicourt G.
  • Liu Z.
  • Violas M.
  • Wang H.
  • Wu Q.

Based on the physical model of a bulk reflective semiconductor optical amplifier (RSOA) used as a modulator in radio over fiber (RoF) links, the distributions of carrier density, signal photon density, and amplified spontaneous emission photon density are demonstrated. One of limits in the use of RSOA is the lower ...

July 12, 2017

PrivApprox: Privacy-Preserving Stream Analytics

  • Chen R.
  • Christof Fetzer
  • Le D.
  • Martin Beck
  • Pramod Bhatotia
  • Thorsten Strufe

How to preserve users' privacy while supporting high-utility analytics for low-latency stream processing? To answer this question: we describe the design, implementation and evaluation of PRIVAPPROX, a data analytics system for privacy-preserving stream processing. PRIVAPPROX provides three properties: (i) Privacy: zero-knowledge privacy (ezk) guarantees for users, a privacy bound tighter ...