Massive MIMO-NOMA Systems Secrecy in the Presence of Active Eavesdroppers
- URL: http://arxiv.org/abs/2105.02215v2
- Date: Mon, 07 Jul 2025 22:18:27 GMT
- Title: Massive MIMO-NOMA Systems Secrecy in the Presence of Active Eavesdroppers
- Authors: Marziyeh Soltani, Mahtab Mirmohseni, Panos Papadimitratos,
- Abstract summary: Non-orthogonal multiple access (NOMA) and massive multiple-input multiple-output (MIMO) systems are highly efficient.<n>Eavesdroppers can transmit a combination of legitimate user pilot signals during the channel estimation phase.<n>This way they can mislead the base station to rotate the transmission in their direction, and allow them to eavesdrop.
- Score: 1.354560757162539
- License: http://arxiv.org/licenses/nonexclusive-distrib/1.0/
- Abstract: Non-orthogonal multiple access (NOMA) and massive multiple-input multiple-output (MIMO) systems are highly efficient. Massive MIMO systems are inherently resistant to passive attackers (eavesdroppers), thanks to transmissions directed to the desired users. However, active attackers can transmit a combination of legitimate user pilot signals during the channel estimation phase. This way they can mislead the base station (BS) to rotate the transmission in their direction, and allow them to eavesdrop during the downlink data transmission phase. In this paper, we analyse this vulnerability in an improved system model and stronger adversary assumptions, and investigate how physical layer security can mitigate such attacks and ensure secure (confidential) communication. We derive the secrecy outage probability (SOP) and a lower bound on the ergodic secrecy capacity, using stochastic geometry tools when the number of antennas in the BSs tends to infinity. We adapt the result to evaluate the secrecy performance in massive orthogonal multiple access (OMA). We find that appropriate power allocation allows NOMA to outperform OMA in terms of ergodic secrecy rate and SOP.
Related papers
- AmbShield: Enhancing Physical Layer Security with Ambient Backscatter Devices against Eavesdroppers [69.56534335936534]
AmbShield is an AmBD-assisted PLS scheme that leverages naturally distributed AmBDs to simultaneously strengthen the legitimate channel and degrade eavesdroppers'<n>In AmbShield, AmBDs are exploited as friendly jammers that randomly backscatter to create interference at eavesdroppers, and as passive relays that backscatter the desired signal to enhance the capacity of legitimate devices.
arXiv Detail & Related papers (2026-01-14T20:56:50Z) - Multi-Agent-Driven Cognitive Secure Communications in Satellite-Terrestrial Networks [58.70163955407538]
Malicious eavesdroppers pose a serious threat to private information via satellite-terrestrial networks (STNs)<n>We propose a cognitive secure communication framework driven by multiple agents that coordinates spectrum scheduling and protection through real-time sensing.<n>We exploit generative adversarial networks to produce adversarial matrices, and employ learning-aided power control to set real and adversarial signal powers for protection layer.
arXiv Detail & Related papers (2026-01-06T10:30:41Z) - Continuous-variable Measurement Device Independent MIMO Quantum Key Distribution for THz Communications [10.446220662978272]
This paper explores a CV measurement-device-independent (MDI) QKD system operating at terahertz (THz)<n>In this system, measurement is delegated to an untrusted third party, Charlie, rather than the receiver, eliminating all detector attacks.<n>The proposed protocol offers a scalable solution for secure quantum communications in next-generation wireless networks.
arXiv Detail & Related papers (2025-11-07T06:52:28Z) - When UAV Swarm Meets IRS: Collaborative Secure Communications in Low-altitude Wireless Networks [68.45202147860537]
Low-altitude wireless networks (LAWNs) provide enhanced coverage, reliability, and throughput for diverse applications.<n>These networks face significant security vulnerabilities from both known and potential unknown eavesdroppers.<n>We propose a novel secure communication framework for LAWNs where the selected UAVs within a swarm function as a virtual antenna array.
arXiv Detail & Related papers (2025-10-25T02:02:14Z) - LLM Meets the Sky: Heuristic Multi-Agent Reinforcement Learning for Secure Heterogeneous UAV Networks [57.27815890269697]
This work focuses on maximizing the secrecy rate in heterogeneous UAV networks (HetUAVNs) under energy constraints.<n>We introduce a Large Language Model (LLM)-guided multi-agent learning approach.<n>Results show that our method outperforms existing baselines in secrecy and energy efficiency.
arXiv Detail & Related papers (2025-07-23T04:22:57Z) - Heterogeneous Secure Transmissions in IRS-Assisted NOMA Communications: CO-GNN Approach [7.2414248136307195]
IRS-assisted NOMA communications have garnered significant research interest.<n>The passive nature of the IRS, lacking authentication and security protocols, makes these systems vulnerable to external eavesdropping.<n>This paper investigates secure transmissions in IRS-assisted NOMA systems with heterogeneous resource configuration in wireless networks to mitigate both external and internal eavesdropping.
arXiv Detail & Related papers (2025-06-03T04:01:50Z) - Backdoor Cleaning without External Guidance in MLLM Fine-tuning [76.82121084745785]
Believe Your Eyes (BYE) is a data filtering framework that leverages attention entropy patterns as self-supervised signals to identify and filter backdoor samples.<n>It achieves near-zero attack success rates while maintaining clean-task performance.
arXiv Detail & Related papers (2025-05-22T17:11:58Z) - On the Vulnerability of Underwater Magnetic Induction Communication [1.0260880679794957]
Magnetic induction (MI) communication is commonly considered a secure underwater wireless communication (UWC) technology.<n>We investigate the eavesdropping attack in underwater MI communication to quantitatively measure the system's vulnerability under this attack.
arXiv Detail & Related papers (2025-05-07T08:53:18Z) - A Channel-Triggered Backdoor Attack on Wireless Semantic Image Reconstruction [22.485161150177866]
Previous research on backdoor attacks targeting SemCom symbol reconstruction primarily focuses on input-level triggers.<n>We propose a novel channel-triggered backdoor attack (CT-BA) framework that exploits inherent wireless channel characteristics as activation triggers.<n>Our attack achieves near-perfect attack success rate (ASR) while maintaining effective stealth.
arXiv Detail & Related papers (2025-03-31T09:17:10Z) - Physical Layer Deception in OFDM Systems [17.558812438019753]
We propose a physical layer deception (PLD) framework to deceive eavesdroppers with falsified information, preventing them from wiretapping.<n>While ensuring the same level of confidentiality as traditional PLS methods, the PLD approach additionally introduces a deception mechanism, which remains effective even when the eavesdropper has the same knowledge about the transmitter as the legitimate receiver.
arXiv Detail & Related papers (2024-11-06T05:34:55Z) - Physical Layer Deception with Non-Orthogonal Multiplexing [52.11755709248891]
We propose a novel framework of physical layer deception (PLD) to actively counteract wiretapping attempts.<n>PLD combines PLS with deception technologies to actively counteract wiretapping attempts.<n>We prove the validity of the PLD framework with in-depth analyses and demonstrate its superiority over conventional PLS approaches.
arXiv Detail & Related papers (2024-06-30T16:17:39Z) - Semantic Entropy Can Simultaneously Benefit Transmission Efficiency and Channel Security of Wireless Semantic Communications [55.54210451136529]
We propose SemEntropy to explore semantics of data for both adaptive transmission and physical layer encryption.<n>We show that SemEntropy can keep the semantic accuracy remain 95% with 60% less transmission.
arXiv Detail & Related papers (2024-02-05T12:25:02Z) - Magmaw: Modality-Agnostic Adversarial Attacks on Machine Learning-Based Wireless Communication Systems [21.878711118514342]
Magmaw is a novel wireless attack methodology capable of generating universal adversarial perturbations for any multimodal signal transmitted over a wireless channel.
We show that Magmaw causes significant performance degradation even in the presence of strong defense mechanisms.
arXiv Detail & Related papers (2023-11-01T00:33:59Z) - Multi-Domain Polarization for Enhancing the Physical Layer Security of MIMO Systems [51.125572358881556]
A novel Physical Layer Security (PLS) framework is conceived for enhancing the security of wireless communication systems.
We design a sophisticated key generation scheme based on multi-domain polarization, and the corresponding receivers.
Our findings indicate that the innovative PLS framework effectively enhances the security and reliability of wireless communication systems.
arXiv Detail & Related papers (2023-10-31T05:50:24Z) - Adversarial Attacks on Deep Learning Based Power Allocation in a Massive
MIMO Network [62.77129284830945]
We show that adversarial attacks can break DL-based power allocation in the downlink of a massive multiple-input-multiple-output (maMIMO) network.
We benchmark the performance of these attacks and show that with a small perturbation in the input of the neural network (NN), the white-box attacks can result in infeasible solutions up to 86%.
arXiv Detail & Related papers (2021-01-28T16:18:19Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.