On Limits of Wireless Communications in a Fading Environment when UsingMultiple Antennas
Wireless Personal Communications: An International Journal
MIMO Wireless Communications: From Real-World Propagation to Space-Time Code Design
MIMO Wireless Communications: From Real-World Propagation to Space-Time Code Design
On the capacity of spatially correlated MIMO Rayleigh-fading channels
IEEE Transactions on Information Theory
Capacity and power allocation for fading MIMO channels with channel estimation error
IEEE Transactions on Information Theory
A simple transmit diversity technique for wireless communications
IEEE Journal on Selected Areas in Communications
From theory to practice: an overview of MIMO space-time coded wireless systems
IEEE Journal on Selected Areas in Communications
Short paper: ACE: authenticating the channel estimation process in wireless communication systems
Proceedings of the fourth ACM conference on Wireless network security
Hi-index | 0.00 |
Multiple-input multiple-output (MIMO) technologies are popular in emerging wireless systems. Optimal MIMO communication is achieved by applying a waterfilling solution over the parallel subchannels associated with the channel matrix between a transmitter and receiver. The viability of such a method relies on the transmitter and receiver performing the singular value decomposition (SVD) of the estimated channel matrix. The estimation and use of the estimated channel matrix, however, is a point of weakness that can be used to subvert MIMO communication. In this paper, we investigate strategies for disrupting MIMO communications by developing attacks that target the channel estimation procedure of a MIMO system. Specifically, we study the impact that jamming the channel estimation procedure can have on SVD-based MIMO systems. Further, most new standards that employ MIMO incorporate space-time block coding (STBC) to bolster throughput and reliability. Although the choice of STBC varies across the standards, the Alamouti [5] scheme is a common basis for many protocols, including 802.11n, WiMAX, and 3GPP. We present jamming attacks that target the Alamouti scheme, and support their validity and effectiveness in the real world using the USRP/GNU Radio platform.