IDEAS home Printed from https://ideas.repec.org/a/gam/jmathe/v12y2024i22p3524-d1518773.html
   My bibliography  Save this article

Pilot Contamination Attack Detection Methods—An Exhaustive Performance Evaluation Through Probability Metrics and Statistical Classification Parameters

Author

Listed:
  • Dimitriya Mihaylova

    (Faculty of Telecommunications, Technical University of Sofia, 1000 Sofia, Bulgaria)

  • Georgi Iliev

    (Faculty of Telecommunications, Technical University of Sofia, 1000 Sofia, Bulgaria)

  • Zlatka Valkova-Jarvis

    (Faculty of Telecommunications, Technical University of Sofia, 1000 Sofia, Bulgaria)

  • Viktor Stoynov

    (Faculty of Telecommunications, Technical University of Sofia, 1000 Sofia, Bulgaria)

Abstract

Among the numerous strategies that an attacker can initiate to enhance its eavesdropping capabilities is the Pilot Contamination Attack (PCA). Two promising methods, based on Phase-Shift Keying (PSK) modulation of Nth order— 2-N-PSK and Shifted 2-N-PSK , can detect an existing PCA by means of analysis of the constellation that the correlation product of received pilot signals belongs to. The overall efficiency of the methods can be studied by the most commonly used probability metrics—detection probability and false alarm probability. However, this information may be insufficient for comparison purposes; therefore, to acquire a more holistic perspective on the methods’ performances, statistical evaluation metrics can be obtained. Depending on the particular application of the system in which the PCA detection methods are incorporated and the distribution of attack initiation among all samples, different classification parameters are of varying significance in the efficiency assessment. In this paper, 2-N-PSK and Shifted 2-N-PSK are comprehensively studied through their probability parameters. In addition, the methods are also compared by their most informative statistical parameters, such as accuracy , precision and recall , F1-score , specificity , and fall-out . A large number of simulations are carried out, the analyses of which indisputably prove the superior behavior of the Shifted 2-N-PSK compared to the 2-N-PSK detection method. Since a method’s performance is strongly related to the number of antenna elements at the base station, all simulations are conducted for scenarios with different antennae numbers. The most promising realization of Shifted 2-N-PSK improves the receiver operating characteristics results of the original 2-N-PSK by 7.38%, 4.33%, and 5.61%, and outperforms the precision recall analyses of 2-N-PSK by 10.02%, 4.82% and 3.86%, for the respective number of 10, 100 and 300 antenna elements at the base station.

Suggested Citation

  • Dimitriya Mihaylova & Georgi Iliev & Zlatka Valkova-Jarvis & Viktor Stoynov, 2024. "Pilot Contamination Attack Detection Methods—An Exhaustive Performance Evaluation Through Probability Metrics and Statistical Classification Parameters," Mathematics, MDPI, vol. 12(22), pages 1-29, November.
  • Handle: RePEc:gam:jmathe:v:12:y:2024:i:22:p:3524-:d:1518773
    as

    Download full text from publisher

    File URL: https://www.mdpi.com/2227-7390/12/22/3524/pdf
    Download Restriction: no

    File URL: https://www.mdpi.com/2227-7390/12/22/3524/
    Download Restriction: no
    ---><---

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:gam:jmathe:v:12:y:2024:i:22:p:3524-:d:1518773. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    We have no bibliographic references for this item. You can help adding them by using this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: MDPI Indexing Manager (email available below). General contact details of provider: https://www.mdpi.com .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.