skip to main content
10.1145/2976749.2978412acmconferencesArticle/Chapter ViewAbstractPublication PagesccsConference Proceedingsconference-collections
research-article

Stemming Downlink Leakage from Training Sequences in Multi-User MIMO Networks

Published: 24 October 2016 Publication History

Abstract

Multi-User MIMO has attracted much attention due to its significant advantage of increasing the utilization ratio of wireless channels. Recently a serious eavesdropping attack, which exploits the CSI feedback of the FDD system, is discovered in MU-MIMO networks. In this paper, we firstly show a similar eavesdropping attack for the TDD system is also possible by proposing a novel, feasible attack approach. Following it, a malicious user can eavesdrop on other users' downloads by transforming training sequences. To prevent this attack, we propose a secure CSI estimation scheme for instantaneous CSI. Furthermore, we extend this scheme to achieve adaptive security when CSI is relatively statistical. We have implemented our scheme for both uplink and downlink of MU-MIMO and performed a series of experiments. Results show that our secure CSI estimation scheme is highly effective in preventing downlink leakage against malicious users.

References

[1]
Gnu radio. http://gnuradio.org/redmine/projects/gnuradio/wiki, 2016.
[2]
Usrp. https://www.ettus.com/, 2016.
[3]
R. Abu-alhiga and H. Haas. Implicit pilot-borne interference feedback for multiuser mimo tdd systems. In 2008 IEEE 10th International Symposium on Spread Spectrum Techniques and Applications, pages 334--338, Aug 2008.
[4]
K. Appaiah, A. Ashikhmin, and T. L. Marzetta. Pilot contamination reduction in multi-user tdd systems. In Communications (ICC), 2010 IEEE International Conference on, pages 1--5, May 2010.
[5]
M. Biguesh and A. Gershman. Training-based mimo channel estimation: a study of estimator tradeoffs and optimal training signals. Signal Processing, IEEE Transactions on, 54(3):884--893, March 2006.
[6]
M. Biguesh and A. B. Gershman. Training-based mimo channel estimation: a study of estimator tradeoffs and optimal training signals. IEEE Transactions on Signal Processing, 54(3):884--893, March 2006.
[7]
Y. Chen and C. Tellambura. Performance analysis of maximum ratio transmission with imperfect channel estimation. IEEE Communications Letters, 9(4):322--324, April 2005.
[8]
J. Choi, D. J. Love, and P. Bidigare. Downlink training techniques for fdd massive mimo systems: Open-loop and closed-loop training with memory. IEEE Journal of Selected Topics in Signal Processing, 8(5):802--814, Oct 2014.
[9]
M. Costa. Writing on dirty paper (corresp.). IEEE Transactions on Information Theory, 29(3):439--441, May 1983.
[10]
P. A. Dighe, R. K. Mallik, and S. S. Jamuar. Analysis of transmit-receive diversity in rayleigh fading. IEEE Transactions on Communications, 51(4):694--703, April 2003.
[11]
R. Gallager. Low-density parity-check codes. IRE Transactions on Information Theory, 8(1):21--28, January 1962.
[12]
D. Guo, Y. Wu, S. S. Shitz, and S. Verdu. Estimation in gaussian noise: Properties of the minimum mean-square error. IEEE Transactions on Information Theory, 57(4):2371--2385, April 2011.
[13]
W. L. Huang, K. B. Letaief, and Y. J. Zhang. Joint channel state based random access and adaptive modulation in wireless lans with multi-packet reception. IEEE Transactions on Wireless Communications, 7(11):4185--4197, November 2008.
[14]
M. Jiang and L. Hanzo. Multiuser mimo-ofdm for next-generation wireless systems. Proceedings of the IEEE, 95(7):1430--1469, July 2007.
[15]
J. Jose, A. Ashikhmin, P. Whiting, and S. Vishwanath. Scheduling and pre-conditioning in multi-user mimo tdd systems. In 2008 IEEE International Conference on Communications, pages 4100--4105, May 2008.
[16]
A. Juels and M. Wattenberg. A fuzzy commitment scheme. In Proceedings of the 6th ACM Conference on Computer and Communications Security, CCS '99, pages 28--36. ACM, 1999.
[17]
E. J. C. Kelkboom, J. Breebaart, T. A. M. Kevenaar, I. Buhan, and R. N. J. Veldhuis. Preventing the decodability attack based cross-matching in a fuzzy commitment scheme. IEEE Transactions on Information Forensics and Security, 6(1):107--121, March 2011.
[18]
M. Kobayashi, N. Jindal, and G. Caire. Training and feedback optimization for multiuser mimo downlink. IEEE Transactions on Communications, 59(8):2228--2240, August 2011.
[19]
H. Li, K. Wu, Q. Zhang, and L. M. Ni. Cuts: Improving channel utilization in both time and spatial domain in wlans. IEEE Transactions on Parallel and Distributed Systems, 25(6):1413--1423, June 2014.
[20]
R. Liao, B. Bellalta, M. Oliver, and Z. Niu. Mu-mimo mac protocols for wireless local area networks: A survey. IEEE Communications Surveys Tutorials, 18(1):162--183, 2016.
[21]
T. H. Lin and H. T. Kung. Concurrent channel access and estimation for scalable multiuser mimo networking. In INFOCOM, 2013 Proceedings IEEE, pages 140--144, April 2013.
[22]
B. Mondal and R. W. H. Jr. Performance analysis of quantized beamforming mimo systems. IEEE Transactions on Signal Processing, 54(12):4753--4766, Dec 2006.
[23]
A. Mukhopadhyay, N. B. Mehta, and V. Srinivasan. Acknowledgement-aware mpr mac protocol for distributed wlans: Design and analysis. In Global Communications Conference (GLOBECOM), 2012 IEEE, pages 5087--5092, Dec 2012.
[24]
H. Q. Ngo, E. G. Larsson, and T. L. Marzetta. Massive mu-mimo downlink tdd systems with linear precoding and downlink pilots. In Communication, Control, and Computing (Allerton), 2013 51st Annual Allerton Conference on, pages 293--298, Oct 2013.
[25]
E. H. Ong, J. Kneckt, O. Alanen, Z. Chang, T. Huovinen, and T. Nihtilä. Ieee 802.11ac: Enhancements for very high throughput wlans. In 2011 IEEE 22nd International Symposium on Personal, Indoor and Mobile Radio Communications, pages 849--853, Sept 2011.
[26]
T. J. Richardson, M. A. Shokrollahi, and R. L. Urbanke. Design of capacity-approaching irregular low-density parity-check codes. IEEE Transactions on Information Theory, 47(2):619--637, Feb 2001.
[27]
N. Shariati, J. Wang, and M. Bengtsson. Robust training sequence design for correlated mimo channel estimation. IEEE Transactions on Signal Processing, 62(1):107--120, Jan 2014.
[28]
H. Shirani-Mehr, D. N. Liu, and G. Caire. Channel state prediction, feedback and scheduling for a multiuser mimo-ofdm downlink. In 2008 42nd Asilomar Conference on Signals, Systems and Computers, pages 136--140, Oct 2008.
[29]
Q. H. Spencer, A. L. Swindlehurst, and M. Haardt. Zero-forcing methods for downlink spatial multiplexing in multiuser mimo channels. IEEE Transactions on Signal Processing, 52(2):461--471, Feb 2004.
[30]
K. Tan, H. Liu, J. Fang, W. Wang, J. Zhang, M. Chen, and G. M. Voelker. Sam: Enabling practical spatial multiple access in wireless lan. In Proceedings of the 15th Annual International Conference on Mobile Computing and Networking, MobiCom '09, pages 49--60. ACM, 2009.
[31]
T. Tandai, H. Mori, K. Toshimitsu, and T. Kobayashi. An efficient uplink multiuser mimo protocol in ieee 802.11 wlans. In 2009 IEEE 20th International Symposium on Personal, Indoor and Mobile Radio Communications, pages 1153--1157, Sept 2009.
[32]
P. Ting, C. K. Wen, and J. T. Chen. An efficient csi feedback scheme for mimo-ofdm wireless systems. IEEE Transactions on Wireless Communications, 6(6):2012--2015, June 2007.
[33]
Y.-C. Tung, S. Han, D. Chen, and K. G. Shin. Vulnerability and protection of channel state information in multiuser mimo networks. In Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, CCS '14, pages 775--786, 2014.
[34]
H. Viswanathan and J. Balakrishnan. Space-time signaling for high data rates in edge. IEEE Transactions on Vehicular Technology, 51(6):1522--1533, Nov 2002.

Cited By

View all
  • (2024)Fewer Demands, More Chances: Active Eavesdropping in MU-MIMO SystemsProceedings of the 17th ACM Conference on Security and Privacy in Wireless and Mobile Networks10.1145/3643833.3656136(162-173)Online publication date: 27-May-2024
  • (2024)Adversarial Attacks on Federated Learning Revisited: a Client-Selection Perspective2024 IEEE Conference on Communications and Network Security (CNS)10.1109/CNS62487.2024.10735606(1-9)Online publication date: 30-Sep-2024
  • (2022)Privacy Breaches and Countermeasures at Terminal Device LayerSecurity in Smart Home Networks10.1007/978-3-031-24185-7_3(37-75)Online publication date: 1-Dec-2022
  • Show More Cited By

Index Terms

  1. Stemming Downlink Leakage from Training Sequences in Multi-User MIMO Networks

        Recommendations

        Comments

        Information & Contributors

        Information

        Published In

        cover image ACM Conferences
        CCS '16: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security
        October 2016
        1924 pages
        ISBN:9781450341394
        DOI:10.1145/2976749
        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Sponsors

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        Published: 24 October 2016

        Permissions

        Request permissions for this article.

        Check for updates

        Author Tags

        1. channel state information
        2. eavesdropping
        3. multi-user mimo
        4. physical security

        Qualifiers

        • Research-article

        Funding Sources

        Conference

        CCS'16
        Sponsor:

        Acceptance Rates

        CCS '16 Paper Acceptance Rate 137 of 831 submissions, 16%;
        Overall Acceptance Rate 1,261 of 6,999 submissions, 18%

        Upcoming Conference

        CCS '25

        Contributors

        Other Metrics

        Bibliometrics & Citations

        Bibliometrics

        Article Metrics

        • Downloads (Last 12 months)15
        • Downloads (Last 6 weeks)0
        Reflects downloads up to 02 Mar 2025

        Other Metrics

        Citations

        Cited By

        View all
        • (2024)Fewer Demands, More Chances: Active Eavesdropping in MU-MIMO SystemsProceedings of the 17th ACM Conference on Security and Privacy in Wireless and Mobile Networks10.1145/3643833.3656136(162-173)Online publication date: 27-May-2024
        • (2024)Adversarial Attacks on Federated Learning Revisited: a Client-Selection Perspective2024 IEEE Conference on Communications and Network Security (CNS)10.1109/CNS62487.2024.10735606(1-9)Online publication date: 30-Sep-2024
        • (2022)Privacy Breaches and Countermeasures at Terminal Device LayerSecurity in Smart Home Networks10.1007/978-3-031-24185-7_3(37-75)Online publication date: 1-Dec-2022
        • (2020)Securing Channel State Information in Multiuser MIMO With Limited FeedbackIEEE Transactions on Wireless Communications10.1109/TWC.2020.297041219:5(3091-3103)Online publication date: May-2020
        • (2020)Secure TDD MIMO Networks Against Training Sequence Based Eavesdropping AttackIEEE Transactions on Mobile Computing10.1109/TMC.2019.293708119:12(2916-2932)Online publication date: 1-Dec-2020
        • (2020)Revealing Your Mobile Password via WiFi Signals: Attacks and CountermeasuresIEEE Transactions on Mobile Computing10.1109/TMC.2019.289333819:2(432-449)Online publication date: 1-Feb-2020
        • (2019)Opportunistic Scheduling for Average Secrecy Rate Enhancement in Fading Downlink Channel With Potential EavesdroppersIEEE Transactions on Information Forensics and Security10.1109/TIFS.2018.286849414:4(969-980)Online publication date: Apr-2019
        • (2019)On User Selective Eavesdropping Attacks in MU-MIMO: CSI Forgery and CountermeasureIEEE INFOCOM 2019 - IEEE Conference on Computer Communications10.1109/INFOCOM.2019.8737412(1963-1971)Online publication date: Apr-2019
        • (2019)A SDR-based verification platform for 802.11 PHY layer security authenticationWorld Wide Web10.1007/s11280-018-0654-2Online publication date: 23-Jan-2019

        View Options

        Login options

        View options

        PDF

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader

        Figures

        Tables

        Media

        Share

        Share

        Share this Publication link

        Share on social media