On massive MIMO physical layer cryptosystem

Ron Steinfeld, Amin Sakzad

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contributionpeer-review

4 Citations (Scopus)

Abstract

In this paper, we present a zero-forcing (ZF) attack on the physical layer cryptography scheme based on massive multiple-input multiple-output (MIMO). The scheme uses singular value decomposition (SVD) precoder. We show that the eavesdropper can decrypt/decode the information data under the same condition as the legitimate receiver. We then study the advantage for decoding by the legitimate user over the eavesdropper in a generalized scheme using an arbitrary precoder at the transmitter. On the negative side, we show that if the eavesdropper uses a number of receive antennas much larger than the number of legitimate user antennas, then there is no advantage, independent of the precoding scheme employed at the transmitter. On the positive side, for the case where the adversary is limited to have the same number of antennas as legitimate users, we give an O(n2) upper bound on the advantage and show that this bound can be approached using an inverse precoder.

Original languageEnglish
Title of host publicationITW 2015
Subtitle of host publication2015 IEEE Information Theory Workshop
Place of PublicationPiscataway, NJ
PublisherInstitute of Electrical and Electronics Engineers (IEEE)
Pages292-296
Number of pages5
ISBN (Electronic)9781467378529, 9781467378512
ISBN (Print)9781467378536
DOIs
Publication statusPublished - 17 Dec 2015
Externally publishedYes
EventIEEE Information Theory Workshop, ITW 2015 - Jeju Island, Korea, Republic of
Duration: 11 Oct 201515 Oct 2015

Other

OtherIEEE Information Theory Workshop, ITW 2015
CountryKorea, Republic of
CityJeju Island
Period11/10/1515/10/15

Keywords

  • Massive MIMO
  • Physical Layer Cryptography
  • Precoding
  • Singular Value
  • Zero-Forcing

Fingerprint Dive into the research topics of 'On massive MIMO physical layer cryptosystem'. Together they form a unique fingerprint.

Cite this