Double Intelligent Reflecting Surface for Secure Transmission with Inter-Surface Signal Reflection

Author(s):  
Limeng Dong ◽  
Hui-Ming Wang ◽  
Jiale Bai ◽  
Haitao Xiao
2020 ◽  
Author(s):  
jie yang ◽  
Xinsheng Ji ◽  
Kaizhi Huang ◽  
Xiaoli Sun ◽  
Xiaoming Xu

Pilot spoofing attack brings challenges to the physical layer secure transmission. However, since the inherent characteristics of wireless environment have not changed, active eavesdropping can be detected based on prior information. Intelligent reflecting surface (IRS), with the real-time programmable characteristics for wireless environment, provides new possibilities for effective pilot spoofing. In this paper, the IRS is deployed near the legitimate users and the control strategy is embeded into the legitimate communication process under time-division duplex (TDD) mode to assist eavesdroppers to implement pilot spoofing. By designing different phase shifts at the IRS during the uplink phase and downlink phase, the channel reciprocity between uplink and downlink disappears, and thus the secure beamforming vector is biased towards the eavesdropper. Furthermore, in order to obtain more information, the average secrecy rate based on the statistical channel state information is established by carefully designing the phase shifts. The formulated problem is non-trivial to solve. By using alternating optimization and Charnes-Cooper transformation technique, the original problem is transformed into convex form and a sub-optimal solution is achieved. Finally, simulation results show that our proposed scheme poses serious secure threat for TDD systems.


2021 ◽  
Author(s):  
jie yang ◽  
Xinsheng Ji ◽  
Feihu Wang ◽  
Kaizhi Huang ◽  
You Zhou

Pilot spoofing attack brings challenges to the physical layer secure transmission. However, since the inherent characteristics of wireless environment have not changed, active eavesdropping can be detected based on prior information. Intelligent reflecting surface (IRS), with the real-time programmable characteristics for wireless environment, provides new possibilities for effective pilot spoofing. In this paper, the IRS is deployed near the legitimate users and the control strategy is embeded into the legitimate communication process under time-division duplex (TDD) mode to assist eavesdroppers to implement pilot spoofing. By designing different phase shifts at the IRS during the uplink phase and downlink phase, the channel reciprocity between uplink and downlink disappears, and thus secure beamforming vector is biased towards the eavesdropper. Furthermore, in order to obtain more information, the average secrecy rate minimization based on statistical channel state information is established by carefully designing the phase shifts. The formulated problem is non-trivial to solve. By using alternating optimization and Charnes-Cooper transformation technique, the original problem is transformed into convex form and a sub-optimal solution is achieved. Finally, simulation results show that our proposed scheme poses serious secure threat without any energy footprint especially for TDD systems.


2021 ◽  
Author(s):  
jie yang ◽  
Xinsheng Ji ◽  
Feihu Wang ◽  
Kaizhi Huang ◽  
Lin Guo

<div>Pilot spoofing attack brings new challenges to physical layer secure transmission. However, this method will not work without any knowledge about the pilot sequence and active eavesdropping can be detected by constructing random pilot sequence. Intelligent reflecting surface (IRS), with the real-time programmable features for wireless channels, provides new possibilities for effective pilot spoofing. In this paper, the IRS is deployed near the legitimate users and the legitimate signal can always be passively reflected. Then the control strategy is embedded into the communication process under time-division duplex mode to assist eavesdroppers to conduct pilot spoofing.</div><div> By setting different phase shifts at the IRS during the uplink phase and downlink phase, the channel reciprocity disappears, and thus secure beamforming vector is biased towards the eavesdropper. Furthermore, in order to overhear more information, the average secrecy rate minimization problem based on statistical channel state information is established by carefully designing the phase shifts, which is non-trivial to solve. With alternating optimization and Charnes-Cooper transformation technique, the original problem is transformed into convex form and a near optimal solution is achieved. Finally, simulation results show that our proposed scheme can pose serious secure threat without any energy footprint. What's more, if the IRS is not utilized by the internal users properly, it will bring more threat. </div>


2021 ◽  
Author(s):  
jie yang ◽  
Xinsheng Ji ◽  
Feihu Wang ◽  
Kaizhi Huang ◽  
You Zhou

Pilot spoofing attack brings new challenges to the physical layer secure transmission. However, since the inherent characteristics of wireless environment have not changed, active eavesdropping can be detected based on prior information. Intelligent reflecting surface (IRS), with the real-time programmable features for wireless channels, provides new possibilities for effective pilot spoofing. In this paper, the IRS is deployed near the legitimate users and the control strategy is embeded into the legitimate communication process under time-division duplex mode to assist eavesdroppers to conduct pilot spoofing. By setting different phase shifts at the IRS during the uplink phase and downlink phase, the channel reciprocity disappears, and thus secure beamforming vector is biased towards the eavesdropper. Furthermore, in order to overhear more information, the average secrecy rate minimization problem based on statistical channel state information is established by carefully designing the phase shifts, which is non-trivial to solve. With alternating optimization and Charnes-Cooper transformation technique, the original problem is transformed into convex form and a near optimal solution is achieved. Finally, simulation results show that our proposed scheme can pose serious secure threat without any energy footprint. What's more, if the IRS is not utilized by the internal users properly, it will bring more threat.


Sign in / Sign up

Export Citation Format

Share Document