{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,11]],"date-time":"2025-09-11T10:32:57Z","timestamp":1757586777781,"version":"3.40.5"},"reference-count":33,"publisher":"SAGE Publications","issue":"5","license":[{"start":{"date-parts":[[2018,5,1]],"date-time":"2018-05-01T00:00:00Z","timestamp":1525132800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/journals.sagepub.com\/page\/policies\/text-and-data-mining-license"}],"funder":[{"name":"Jiangsu Provincial Natural Science Foundation of China","award":["BK20141069"],"award-info":[{"award-number":["BK20141069"]}]}],"content-domain":{"domain":["journals.sagepub.com"],"crossmark-restriction":true},"short-container-title":["International Journal of Distributed Sensor Networks"],"published-print":{"date-parts":[[2018,5]]},"abstract":"<jats:p> This article studies the physical layer security of massive multiple-input multiple-output system in time-division-duplex mode. Specifically, a single-cell downlink massive multiple-input multiple-output communication system is considered. The resulting achievable secrecy rate is investigated in the presence of passive or active eavesdroppers. The analytical results reveal that the massive multiple-input multiple-output system is naturally immune to passive eavesdroppers, but will be dramatically degraded by active attack. On account of the risk caused by active attack, a simple and effective detection algorithm is proposed. Uplink pilots with random phases are transmitted during the detection operation. By comparing the phase deviation change of the received pilot signals\u2019 cross product, the active eavesdroppers can be detected exactly. The closed-form expressions for probabilities of detection, false alarm, and false rejection are obtained respectively, which can demonstrate the robust performance of the proposed detection scheme. To maximize the secrecy energy efficiency of the system, the optimal power allocation strategy is studied under total power constraints. This optimization problem is efficiently solved by fractional programming. Numerical simulation results are derived to validate the secrecy performance of the massive multiple-input multiple-output system, the active pilot attacker detection performance, and the energy efficiency optimization effect. <\/jats:p>","DOI":"10.1177\/1550147718776922","type":"journal-article","created":{"date-parts":[[2018,5,19]],"date-time":"2018-05-19T06:38:14Z","timestamp":1526711894000},"page":"155014771877692","update-policy":"https:\/\/doi.org\/10.1177\/sage-journals-update-policy","source":"Crossref","is-referenced-by-count":8,"title":["Secure performance analysis and detection of pilot attack in massive multiple-input multiple-output system"],"prefix":"10.1177","volume":"14","author":[{"given":"Xianyu","family":"Zhang","sequence":"first","affiliation":[{"name":"The Army Engineering University of PLA, Nanjing, China"}]},{"given":"Daoxing","family":"Guo","sequence":"additional","affiliation":[{"name":"The Army Engineering University of PLA, Nanjing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7535-2057","authenticated-orcid":false,"given":"Kefeng","family":"Guo","sequence":"additional","affiliation":[{"name":"The Army Engineering University of PLA, Nanjing, China"}]},{"given":"Hehao","family":"Niu","sequence":"additional","affiliation":[{"name":"The Army Engineering University of PLA, Nanjing, China"}]}],"member":"179","published-online":{"date-parts":[[2018,5,18]]},"reference":[{"key":"bibr1-1550147718776922","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2014.6845056"},{"key":"bibr2-1550147718776922","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2014.6815890"},{"key":"bibr3-1550147718776922","doi-asserted-by":"publisher","DOI":"10.15325\/BLTJ.2015.2407793"},{"key":"bibr4-1550147718776922","doi-asserted-by":"publisher","DOI":"10.1109\/MVT.2015.2496240"},{"key":"bibr5-1550147718776922","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2010.092810.091092"},{"key":"bibr6-1550147718776922","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2016.7402270"},{"key":"bibr7-1550147718776922","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2013.020413.110848"},{"key":"bibr8-1550147718776922","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2011.2178495"},{"key":"bibr9-1550147718776922","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2015.7120012"},{"key":"bibr10-1550147718776922","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2008.921908"},{"key":"bibr11-1550147718776922","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2015.2459592"},{"key":"bibr12-1550147718776922","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2013.2256953"},{"key":"bibr13-1550147718776922","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2017.2648742"},{"key":"bibr14-1550147718776922","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2010.2068852"},{"key":"bibr15-1550147718776922","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2014.2337308"},{"key":"bibr16-1550147718776922","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2016.2569118"},{"key":"bibr17-1550147718776922","doi-asserted-by":"publisher","DOI":"10.1049\/iet-com.2015.0216"},{"key":"bibr18-1550147718776922","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2016.2608895"},{"first-page":"1753","volume-title":"Proceedings of the 2017 11th European conference on antennas and propagation (EUCAP)","author":"Yaacoub E","key":"bibr19-1550147718776922"},{"key":"bibr20-1550147718776922","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2015.2511808"},{"first-page":"1","volume-title":"Proceedings of the 2015 IEEE global communications conference (GLOBECOM)","author":"Chen J","key":"bibr21-1550147718776922"},{"key":"bibr22-1550147718776922","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2016.2608932"},{"key":"bibr23-1550147718776922","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2017.2712708"},{"key":"bibr24-1550147718776922","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2017.2715187"},{"first-page":"1","volume-title":"Proceedings of the IEEE Middle East conference on antennas and propagation (MECAP)","author":"Yaacoub E","key":"bibr25-1550147718776922"},{"key":"bibr26-1550147718776922","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2012.020712.111298"},{"first-page":"13","volume-title":"Proceedings of the IEEE personal, indoor and mobile radio communications (PIMRC)","author":"Kapetanovic D","key":"bibr27-1550147718776922"},{"first-page":"1","volume-title":"Proceedings of the 2016 8th international conference on wireless communications and signal process (WCSP)","author":"Hou X","key":"bibr28-1550147718776922"},{"key":"bibr29-1550147718776922","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2014.2329273"},{"key":"bibr30-1550147718776922","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2651098"},{"key":"bibr31-1550147718776922","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2016.2551685"},{"first-page":"1","volume-title":"Proceedings of the 2016 8th international conference on wireless communications and signal process (WCSP)","author":"Li B","key":"bibr32-1550147718776922"},{"first-page":"272","volume-title":"Proceedings of the 2015 IEEE conference on communications and network security (CNS)","author":"Basciftci YO","key":"bibr33-1550147718776922"}],"container-title":["International Journal of Distributed Sensor Networks"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/journals.sagepub.com\/doi\/pdf\/10.1177\/1550147718776922","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/journals.sagepub.com\/doi\/full-xml\/10.1177\/1550147718776922","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/journals.sagepub.com\/doi\/pdf\/10.1177\/1550147718776922","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,12,7]],"date-time":"2020-12-07T06:48:31Z","timestamp":1607323711000},"score":1,"resource":{"primary":{"URL":"http:\/\/journals.sagepub.com\/doi\/10.1177\/1550147718776922"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,5]]},"references-count":33,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2018,5]]}},"alternative-id":["10.1177\/1550147718776922"],"URL":"https:\/\/doi.org\/10.1177\/1550147718776922","relation":{},"ISSN":["1550-1477","1550-1477"],"issn-type":[{"type":"print","value":"1550-1477"},{"type":"electronic","value":"1550-1477"}],"subject":[],"published":{"date-parts":[[2018,5]]}}}