EconPapers    
Economics at your fingertips  
 

Pilot Contamination Attack Detection Methods—An Exhaustive Performance Evaluation Through Probability Metrics and Statistical Classification Parameters

Dimitriya Mihaylova (), Georgi Iliev, Zlatka Valkova-Jarvis and Viktor Stoynov
Additional contact information
Dimitriya Mihaylova: Faculty of Telecommunications, Technical University of Sofia, 1000 Sofia, Bulgaria
Georgi Iliev: Faculty of Telecommunications, Technical University of Sofia, 1000 Sofia, Bulgaria
Zlatka Valkova-Jarvis: Faculty of Telecommunications, Technical University of Sofia, 1000 Sofia, Bulgaria
Viktor Stoynov: Faculty of Telecommunications, Technical University of Sofia, 1000 Sofia, Bulgaria

Mathematics, 2024, vol. 12, issue 22, 1-29

Abstract: Among the numerous strategies that an attacker can initiate to enhance its eavesdropping capabilities is the Pilot Contamination Attack (PCA). Two promising methods, based on Phase-Shift Keying (PSK) modulation of Nth order— 2-N-PSK and Shifted 2-N-PSK , can detect an existing PCA by means of analysis of the constellation that the correlation product of received pilot signals belongs to. The overall efficiency of the methods can be studied by the most commonly used probability metrics—detection probability and false alarm probability. However, this information may be insufficient for comparison purposes; therefore, to acquire a more holistic perspective on the methods’ performances, statistical evaluation metrics can be obtained. Depending on the particular application of the system in which the PCA detection methods are incorporated and the distribution of attack initiation among all samples, different classification parameters are of varying significance in the efficiency assessment. In this paper, 2-N-PSK and Shifted 2-N-PSK are comprehensively studied through their probability parameters. In addition, the methods are also compared by their most informative statistical parameters, such as accuracy , precision and recall , F1-score , specificity , and fall-out . A large number of simulations are carried out, the analyses of which indisputably prove the superior behavior of the Shifted 2-N-PSK compared to the 2-N-PSK detection method. Since a method’s performance is strongly related to the number of antenna elements at the base station, all simulations are conducted for scenarios with different antennae numbers. The most promising realization of Shifted 2-N-PSK improves the receiver operating characteristics results of the original 2-N-PSK by 7.38%, 4.33%, and 5.61%, and outperforms the precision recall analyses of 2-N-PSK by 10.02%, 4.82% and 3.86%, for the respective number of 10, 100 and 300 antenna elements at the base station.

Keywords: pilot contamination attack; physical layer security; statistical evaluation; binary classification (search for similar items in EconPapers)
JEL-codes: C (search for similar items in EconPapers)
Date: 2024
References: View complete reference list from CitEc
Citations:

Downloads: (external link)
https://www.mdpi.com/2227-7390/12/22/3524/pdf (application/pdf)
https://www.mdpi.com/2227-7390/12/22/3524/ (text/html)

Related works:
This item may be available elsewhere in EconPapers: Search for items with the same title.

Export reference: BibTeX RIS (EndNote, ProCite, RefMan) HTML/Text

Persistent link: https://EconPapers.repec.org/RePEc:gam:jmathe:v:12:y:2024:i:22:p:3524-:d:1518773

Access Statistics for this article

Mathematics is currently edited by Ms. Emma He

More articles in Mathematics from MDPI
Bibliographic data for series maintained by MDPI Indexing Manager ().

 
Page updated 2025-03-19
Handle: RePEc:gam:jmathe:v:12:y:2024:i:22:p:3524-:d:1518773