Pilot-Attacks Can Enable Positive-Rate Covert Communications of Wireless Hardware Trojans

Serhat Bakirtas, Matthieu R. Bloch, Elza Erkip

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

Hardware Trojans can inflict harm on wireless networks by exploiting the link margins inherent in communication systems. We investigate a setting in which, alongside a legitimate communication link, a hardware Trojan embedded in the legitimate transmitter attempts to establish communication with its intended rogue receiver. To illustrate the susceptibility of wireless networks against pilot attacks, we examine a two-phased scenario. In the channel estimation phase, the Trojan carries out a covert pilot scaling attack to corrupt the channel estimation of the legitimate receiver. Subsequently, in the communication phase, the Trojan exploits the ensuing imperfect channel estimation to covertly communicate with its receiver. By analyzing the corresponding hypothesis tests conducted by the legitimate receiver in both phases, we establish that the pilot scaling attack allows the Trojan to operate in the so-called "linear regime"i.e., covertly and reliably transmitting at a positive rate to the rogue receiver. Our results highlight the vulnerability of the channel estimation process in wireless communication systems against hardware Trojans.

Original languageEnglish (US)
Title of host publicationGLOBECOM 2024 - 2024 IEEE Global Communications Conference
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages1341-1346
Number of pages6
ISBN (Electronic)9798350351255
DOIs
StatePublished - 2024
Event2024 IEEE Global Communications Conference, GLOBECOM 2024 - Cape Town, South Africa
Duration: Dec 8 2024Dec 12 2024

Publication series

NameProceedings - IEEE Global Communications Conference, GLOBECOM
ISSN (Print)2334-0983
ISSN (Electronic)2576-6813

Conference

Conference2024 IEEE Global Communications Conference, GLOBECOM 2024
Country/TerritorySouth Africa
CityCape Town
Period12/8/2412/12/24

Keywords

  • covert communications
  • hardware Trojans
  • pilot corruption attack
  • wireless communications

ASJC Scopus subject areas

  • Artificial Intelligence
  • Computer Networks and Communications
  • Hardware and Architecture
  • Signal Processing

Fingerprint

Dive into the research topics of 'Pilot-Attacks Can Enable Positive-Rate Covert Communications of Wireless Hardware Trojans'. Together they form a unique fingerprint.

Cite this