{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T07:44:13Z","timestamp":1740123853316,"version":"3.37.3"},"reference-count":34,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2023,10,26]],"date-time":"2023-10-26T00:00:00Z","timestamp":1698278400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,10,26]],"date-time":"2023-10-26T00:00:00Z","timestamp":1698278400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62372065"],"award-info":[{"award-number":["62372065"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100004735","name":"Natural Science Foundation of Hunan Province","doi-asserted-by":"publisher","award":["2021JJ30737"],"award-info":[{"award-number":["2021JJ30737"]}],"id":[{"id":"10.13039\/501100004735","id-type":"DOI","asserted-by":"publisher"}]},{"name":"the key project of education bureau of Hunan province","award":["20A016"],"award-info":[{"award-number":["20A016"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Wireless Netw"],"published-print":{"date-parts":[[2024,2]]},"DOI":"10.1007\/s11276-023-03539-7","type":"journal-article","created":{"date-parts":[[2023,10,26]],"date-time":"2023-10-26T06:02:36Z","timestamp":1698300156000},"page":"973-985","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Pilot spoofing detection based on pilot random block encryption"],"prefix":"10.1007","volume":"30","author":[{"given":"Shiguo","family":"Wang","sequence":"first","affiliation":[]},{"given":"Hongdong","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Rukhsana","family":"Ruby","sequence":"additional","affiliation":[]},{"given":"Xiukai","family":"Ruan","sequence":"additional","affiliation":[]},{"given":"Yongjian","family":"Zhang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,10,26]]},"reference":[{"key":"3539_CR1","doi-asserted-by":"crossref","unstructured":"Ayach, O. E., Rajagopal, S., Abu-Surra, S., Pi, Z., & Heath, R. W. (2014). Spatially sparse precoding in millimeter wave MIMO systems. IEEE Transactions on Wireless Communications, 13(3), 1499\u20131513.","DOI":"10.1109\/TWC.2014.011714.130846"},{"issue":"3","key":"3539_CR2","doi-asserted-by":"publisher","first-page":"4881","DOI":"10.1109\/JSYST.2022.3147956","volume":"16","author":"S Wang","year":"2022","unstructured":"Wang, S., He, M., Wang, J., Ran, R., Ji, H., & Leung, Victor C. M. (2022). A family of hybrid precoding schemes for millimeter-wave massive MIMO systems. IEEE Systems Journal, 16(3), 4881\u20134891.","journal-title":"IEEE Systems Journal"},{"issue":"4","key":"3539_CR3","doi-asserted-by":"publisher","first-page":"2384","DOI":"10.1109\/COMST.2021.3108618","volume":"23","author":"V Nguyen","year":"2021","unstructured":"Nguyen, V., Lin, P., Cheng, B., Hwang, R., & Lin, T. (2021). Security and privacy for 6G: A survey on prospective technologies and challenges. IEEE Communications Surveys and Tutorials, 23(4), 2384\u20132467.","journal-title":"IEEE Communications Surveys and Tutorials"},{"issue":"3","key":"3539_CR4","doi-asserted-by":"publisher","first-page":"1879","DOI":"10.1109\/COMST.2021.3081450","volume":"23","author":"Z Yu","year":"2021","unstructured":"Yu, Z., Kaplan, Z., Yan, Q., & Zhang, N. (2021). Security and privacy in the emerging cyber-physical world: A survey. IEEE Communications Surveys and Tutorials, 23(3), 1879\u20131919.","journal-title":"IEEE Communications Surveys and Tutorials"},{"issue":"4","key":"3539_CR5","doi-asserted-by":"publisher","first-page":"171","DOI":"10.1109\/MCOM.2015.7081074","volume":"53","author":"H Zhou","year":"2015","unstructured":"Zhou, H., Wu, C., Jiang, M., Zhou, B., Gao, W., Pan, T., & Huang, M. (2015). Evolving defense mechanism for future network security. IEEE Communications Magazine, 53(4), 171\u2013178.","journal-title":"IEEE Communications Magazine"},{"issue":"1","key":"3539_CR6","doi-asserted-by":"publisher","first-page":"171","DOI":"10.1109\/MCOM.2018.1700662","volume":"56","author":"S Hyun","year":"2018","unstructured":"Hyun, S., Kim, J., Kim, H., Jeong, J., Hares, S., Dunbar, L., & Farrel, A. (2018). Interface to network security functions for cloud-based security services. IEEE Communications Magazine, 56(1), 171\u2013178.","journal-title":"IEEE Communications Magazine"},{"issue":"4","key":"3539_CR7","doi-asserted-by":"publisher","first-page":"679","DOI":"10.1109\/JSAC.2018.2825560","volume":"36","author":"Y Wu","year":"2018","unstructured":"Wu, Y., Khusti, A., Xiao, C., Caire, G., Wong, K.-K., & Gao, X. (2018). A survey of physical layer security techniques for 5G wireless networks and challenges ahead. IEEE Journal on Selected Areas in Communications, 36(4), 679\u2013685.","journal-title":"IEEE Journal on Selected Areas in Communications"},{"issue":"1","key":"3539_CR8","doi-asserted-by":"publisher","first-page":"282","DOI":"10.1109\/COMST.2020.3042188","volume":"23","author":"N Xie","year":"2021","unstructured":"Xie, N., Li, Z., & Tan, H. (2021). A survey of physical-layer authentication in wireless communications. IEEE Communications Surveys and Tutorials, 23(1), 282\u2013310.","journal-title":"IEEE Communications Surveys and Tutorials"},{"key":"3539_CR9","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1002\/dac.4765","volume":"1","author":"MK Roberts","year":"2021","unstructured":"Roberts, M. K., Kumari, S., & Anjuraj, P. (2021). Certain investigations on recent advances in the design of decoding algorithms using low-density parity-check codes and its applications. The International Journal of Communication Systems, 1, 1. https:\/\/doi.org\/10.1002\/dac.4765","journal-title":"The International Journal of Communication Systems"},{"issue":"10","key":"3539_CR10","doi-asserted-by":"publisher","first-page":"2135","DOI":"10.1002\/j.1538-7305.1984.tb00072.x","volume":"63","author":"LH Ozarow","year":"1984","unstructured":"Ozarow, L. H., & Wyner, A. D. (1984). Wire-tap channel II. AT &T Bell Laboratories Technical Journal, 63(10), 2135\u20132157.","journal-title":"AT &T Bell Laboratories Technical Journal"},{"issue":"6","key":"3539_CR11","doi-asserted-by":"publisher","first-page":"2180","DOI":"10.1109\/TWC.2008.060848","volume":"7","author":"S Goel","year":"2008","unstructured":"Goel, S., & Negi, R. (2008). Guaranteeing secrecy using artificial noise. IEEE Transactions on Wireless Communications, 7(6), 2180\u20132189.","journal-title":"IEEE Transactions on Wireless Communications"},{"issue":"2","key":"3539_CR12","doi-asserted-by":"publisher","first-page":"1027","DOI":"10.1109\/COMST.2016.2633387","volume":"19","author":"X Chen","year":"2017","unstructured":"Chen, X., Ng, D. W. K., Gerstacker, W. H., & Chen, H. (2017). A survey on multiple-antenna techniques for physical layer security. IEEE Communications Surveys and Tutorials, 19(2), 1027\u20131053.","journal-title":"IEEE Communications Surveys and Tutorials"},{"issue":"10","key":"3539_CR13","doi-asserted-by":"publisher","first-page":"2882","DOI":"10.1109\/JSAC.2022.3196099","volume":"40","author":"S Wang","year":"2022","unstructured":"Wang, S., Li, Z., He, M., Jiang, T., Ruby, R., Ji, H., & Leung, V. C. M. (2022). A joint hybrid precoding\/combining scheme based on equivalent channel for massive MIMO systems. IEEE Journal on Selected Areas in Communications, 40(10), 2882\u20132893.","journal-title":"IEEE Journal on Selected Areas in Communications"},{"issue":"4","key":"3539_CR14","doi-asserted-by":"publisher","first-page":"357","DOI":"10.1109\/LWC.2014.2317194","volume":"3","author":"Q Xiong","year":"2014","unstructured":"Xiong, Q., Gong, Y., Liang, Y. C., & Li, K. H. (2014). Achieving secrecy of miso fading wiretap channels via jamming and precoding with imperfect channel state information. IEEE Wireless Communications Letters, 3(4), 357\u2013360.","journal-title":"IEEE Wireless Communications Letters"},{"issue":"8","key":"3539_CR15","doi-asserted-by":"publisher","first-page":"1875","DOI":"10.1109\/TIFS.2018.2797055","volume":"13","author":"A Al-Nahari","year":"2018","unstructured":"Al-Nahari, A., Geraci, G., Al-Jamali, M., Ahmed, M. H., & Yang, N. (2018). Beamforming With Artificial Noise for Secure MISOME Cognitive Radio Transmissions. IEEE Transactions on Information Forensics and Security, 13(8), 1875\u20131889.","journal-title":"IEEE Transactions on Information Forensics and Security"},{"issue":"6","key":"3539_CR16","doi-asserted-by":"publisher","first-page":"1470","DOI":"10.1109\/TIFS.2017.2663336","volume":"12","author":"W Wang","year":"2017","unstructured":"Wang, W., Teh, K. C., & Li, K. H. (2017). Artificial noise aided physical layer security in multi-antenna small-cell networks. IEEE Transactions on Information Forensics and Security, 12(6), 1470\u20131482.","journal-title":"IEEE Transactions on Information Forensics and Security"},{"issue":"10","key":"3539_CR17","doi-asserted-by":"publisher","first-page":"2628","DOI":"10.1109\/TIFS.2018.2825944","volume":"13","author":"Q Li","year":"2018","unstructured":"Li, Q., & Yang, L. (2018). Artificial noise aided secure precoding for MIMO untrusted two-way relay systems with perfect and imperfect channel state information. IEEE Transactions on Information Forensics and Security, 13(10), 2628\u20132638.","journal-title":"IEEE Transactions on Information Forensics and Security"},{"issue":"5","key":"3539_CR18","doi-asserted-by":"publisher","first-page":"932","DOI":"10.1109\/TIFS.2015.2392564","volume":"10","author":"Q Xiong","year":"2015","unstructured":"Xiong, Q., Liang, Y., Li, K. H., & Gong, Y. (2015). An energy-ratio-based approach for detecting pilot spoofing attack in multiple-antenna systems. IEEE Transactions on Information Forensics and Security, 10(5), 932\u2013940.","journal-title":"IEEE Transactions on Information Forensics and Security"},{"key":"3539_CR19","doi-asserted-by":"crossref","unstructured":"Tomasin, S., Land, I., Gabry, F. (2016). Pilot contamination attack detection by key-confirmation in secure MIMO systems. In Global Communications Conference (GLOBECOM), Washington, USA (pp. 1\u20137).","DOI":"10.1109\/GLOCOM.2016.7842146"},{"issue":"5","key":"3539_CR20","doi-asserted-by":"publisher","first-page":"1017","DOI":"10.1109\/TIFS.2016.2516825","volume":"11","author":"Q Xiong","year":"2016","unstructured":"Xiong, Q., Liang, Y.-C., Li, K. H., Gong, Y., & Han, S. (2016). Secure transmission against pilot spoofing attack: A two-way training-based scheme. IEEE Transactions on Information Forensics and Security, 11(5), 1017\u20131026.","journal-title":"IEEE Transactions on Information Forensics and Security"},{"issue":"9","key":"3539_CR21","doi-asserted-by":"publisher","first-page":"2387","DOI":"10.1109\/TIFS.2019.2899484","volume":"14","author":"S Xu","year":"2019","unstructured":"Xu, S., Xu, W., Pan, C., & Elkasshlan, M. (2019). Detectioin of jamming attack in non-coherent massive SIMO systems. IEEE Transactions on Information Forensics and Security, 14(9), 2387\u20132399.","journal-title":"IEEE Transactions on Information Forensics and Security"},{"issue":"5","key":"3539_CR22","doi-asserted-by":"publisher","first-page":"1017","DOI":"10.1109\/TIFS.2016.2516825","volume":"11","author":"Q Xiong","year":"2016","unstructured":"Xiong, Q., Liang, Y.-C., Li, K. H., Gong, Y., & Han, S. (2016). Secure transmission against pilot spoofing attack: A two-way training-based scheme. IEEE Transactions on Information Forensics and Security, 11(5), 1017\u2013026.","journal-title":"IEEE Transactions on Information Forensics and Security"},{"key":"3539_CR23","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/JIOT.2023.3264679","volume":"1","author":"L Chai","year":"2023","unstructured":"Chai, L., Bai, L., Bai, T., Shi, J., & Nallanathan, A. (2023). Secure RIS-aided MISO-NOMA system design in the presence of active eavesdropping. IEEE Internet of Things Journal, 1, 1. https:\/\/doi.org\/10.1109\/JIOT.2023.3264679","journal-title":"IEEE Internet of Things Journal"},{"issue":"5","key":"3539_CR24","doi-asserted-by":"publisher","first-page":"525","DOI":"10.1109\/LWC.2015.2451638","volume":"4","author":"JK Tugnait","year":"2015","unstructured":"Tugnait, J. K. (2015). Self-contamination for detection of pilot contamination attack in multiple antenna systems. IEEE Wireless Communications Letters, 4(5), 525\u2013528.","journal-title":"IEEE Wireless Communications Letters"},{"issue":"5","key":"3539_CR25","doi-asserted-by":"publisher","first-page":"2093","DOI":"10.1109\/TCOMM.2018.2797989","volume":"66","author":"JK Tugnait","year":"2018","unstructured":"Tugnait, J. K. (2018). Pilot spoofing attack detection and countermeasure. IEEE Transactions on Communications, 66(5), 2093\u20132106.","journal-title":"IEEE Transactions on Communications"},{"key":"3539_CR26","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/JSYST.2022.3188279","volume":"1","author":"N Li","year":"2022","unstructured":"Li, N., Gao, Y., Xu, K., Guo, M., Sha, N., Wang, X., & Wang, G. (2022). Spatial sparity-based pilot attack detection and transmission countermeasure for cell-free massive MIMO systems. IEEE Systems Journal, 1, 1. https:\/\/doi.org\/10.1109\/JSYST.2022.3188279","journal-title":"IEEE Systems Journal"},{"key":"3539_CR27","doi-asserted-by":"publisher","first-page":"1396","DOI":"10.1109\/TIFS.2020.3036805","volume":"16","author":"W Xu","year":"2021","unstructured":"Xu, W., Yuan, C., Xu, S., Ngo, H. Q., & Xiang, W. (2021). On pilot spoofing attack in massive MIMO systems: Detection and countermeasure. IEEE Transactions on Information Forensics and Security, 16, 1396\u20131409.","journal-title":"IEEE Transactions on Information Forensics and Security"},{"issue":"2","key":"3539_CR28","doi-asserted-by":"publisher","first-page":"314","DOI":"10.1109\/LCOMM.2018.2889491","volume":"23","author":"X Liu","year":"2019","unstructured":"Liu, X., Li, B., Chen, H., Sun, Z., Liang, Y.-C., & Zhao, C. (2019). Detecting pilot spoofing attack in miso systems with trusted user. IEEE Communications Letters, 23(2), 314\u2013317.","journal-title":"IEEE Communications Letters"},{"key":"3539_CR29","doi-asserted-by":"publisher","first-page":"33","DOI":"10.1016\/j.comcom.2023.02.014","volume":"202","author":"S Wang","year":"2023","unstructured":"Wang, S., Fu, X., Ruby, R., & Li, Z. (2023). Pilot spoofing detection for massive MIMO mmWave communication systems with a cooperative relay. Computer Communications, 202, 33\u201341.","journal-title":"Computer Communications"},{"key":"3539_CR30","doi-asserted-by":"publisher","first-page":"94984","DOI":"10.1109\/ACCESS.2020.2995402","volume":"8","author":"L Ning","year":"2020","unstructured":"Ning, L., Li, B., Zhao, C., Tao, Y., & Wang, X. (2020). Detection and localization of the eavesdropper in mimo systems. IEEE Access, 8, 94984\u201394993.","journal-title":"IEEE Access"},{"key":"3539_CR31","doi-asserted-by":"crossref","unstructured":"Wang, W., Yin, Z., Lyu, F., Wu, H., Wu, Q., & Shen, X. (2019). Pilot spoofing attack detection and downlink precoding in massive mimo systems. In 11th International Conference on Wireless Communications and Signal Processing (WCSP), Xian, China (pp. 1\u20136).","DOI":"10.1109\/WCSP.2019.8928068"},{"issue":"3","key":"3539_CR32","first-page":"1688","volume":"22","author":"Y Tao","year":"2023","unstructured":"Tao, Y., Wang, X., Li, B., & Zhao, C. (2023). Pilot spoofing attack detection and localization with mobile eavesdropper. IEEE Transactions on Mobile Computing, 22(3), 1688\u20131701.","journal-title":"IEEE Transactions on Mobile Computing"},{"key":"3539_CR33","doi-asserted-by":"publisher","first-page":"19228","DOI":"10.1109\/ACCESS.2021.3054821","volume":"9","author":"X Liu","year":"2021","unstructured":"Liu, X., Tao, Y., Zhao, C., & Sun, Z. (2021). Detect pilot spoofing attack for intelligent reflections surface assisted systems. IEEE Access, 9, 19228\u201319237.","journal-title":"IEEE Access"},{"key":"3539_CR34","doi-asserted-by":"publisher","first-page":"1300","DOI":"10.1109\/TIFS.2022.3159108","volume":"17","author":"S Asaad","year":"2022","unstructured":"Asaad, S., Wu, Y., Bereyhi, A., Muller, R. R., Schaefer, R. F., & Poor, H. V. (2022). Secure active and passive beamforming in IRS-aided mimo systems. IEEE Transactions on Information Forensics and Security, 17, 1300\u20131315.","journal-title":"IEEE Transactions on Information Forensics and Security"}],"container-title":["Wireless Networks"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11276-023-03539-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11276-023-03539-7\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11276-023-03539-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,2,21]],"date-time":"2024-02-21T07:17:53Z","timestamp":1708499873000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11276-023-03539-7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,10,26]]},"references-count":34,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2024,2]]}},"alternative-id":["3539"],"URL":"https:\/\/doi.org\/10.1007\/s11276-023-03539-7","relation":{},"ISSN":["1022-0038","1572-8196"],"issn-type":[{"type":"print","value":"1022-0038"},{"type":"electronic","value":"1572-8196"}],"subject":[],"published":{"date-parts":[[2023,10,26]]},"assertion":[{"value":"23 September 2023","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"26 October 2023","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}