DoS Resilience, Secrecy, and Throughput in Massive MIMO

The driving vision of this project is to develop the foundations for realizing denial of service resilience, secrecy, and high throughput in next-generation wireless networks in which base stations or access points (APs) scale their antenna and computing resources to Massive MIMO. This project considers a practical yet strong adversary that launches both active attacks, attempting to collapse network throughput by polluting AP measurement of Channel State Information (CSI), as well as passive attacks, that attempt to intercept communication via potentially distributed and nomadic eavesdroppers.

To realize this, our goals include the following integrated research thrusts.

  • Three integrated and fundamental advances towards realizing secure and high-performance wireless networks are targeted: Because CSI, the complex-valued channel coefficients between transmitter-receiver antennas, is critical for realizing the performance gains of Massive MIMO, an adversary has strong incentive to corrupt CSI measurement. The first project thrust targets to detect and defend against pilot contamination attacks with zero startup cost, i.e., without requiring prior measurements of conditions without an attack.
  • In theory, the many-antenna regime renders passive eavesdropping ineffective on the downlink as the secrecy rate approaches the channel capacity. The second project thrust experimentally explores passive eavesdropping under realworld factors such as a large but finite number of antennas and a discrete and limited set of modulation and coding schemes (MCS). With a discovery of MCS saturation vulnerability, the project will study power control designed to overcome this vulnerability and thwart the adversary.
  • On the uplink, the third project thrust develops antenna index coding as means to target reception on a subset of the Massive MIMO array. Independence of the channels between the target victim and the adversary ensures that the index cannot be inferred by the adversary. A key outcome will be both derivation of the secrecy rate as well as experimental evaluation of this new mechanism.