{"id":"https://openalex.org/W4387011236","doi":"https://doi.org/10.1109/tifs.2023.3318941","title":"Secrecy Rate Analysis and Active Pilot Attack Detection for IRS-Aided Massive MIMO Systems","display_name":"Secrecy Rate Analysis and Active Pilot Attack Detection for IRS-Aided Massive MIMO Systems","publication_year":2023,"publication_date":"2023-09-25","ids":{"openalex":"https://openalex.org/W4387011236","doi":"https://doi.org/10.1109/tifs.2023.3318941"},"language":"en","primary_location":{"id":"doi:10.1109/tifs.2023.3318941","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2023.3318941","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5092934253","display_name":"Janith Kavindu Dassanayake","orcid":"https://orcid.org/0009-0005-5682-6180"},"institutions":[{"id":"https://openalex.org/I110378019","display_name":"Southern Illinois University Carbondale","ror":"https://ror.org/049kefs16","country_code":"US","type":"education","lineage":["https://openalex.org/I110378019","https://openalex.org/I2801502357"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Janith Kavindu Dassanayake","raw_affiliation_strings":["School of Electrical, Computer and Biomedical Engineering, Southern Illinois University, Carbondale, IL, USA"],"affiliations":[{"raw_affiliation_string":"School of Electrical, Computer and Biomedical Engineering, Southern Illinois University, Carbondale, IL, USA","institution_ids":["https://openalex.org/I110378019"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5091880974","display_name":"Dulaj Gunasinghe","orcid":"https://orcid.org/0000-0001-8537-7082"},"institutions":[{"id":"https://openalex.org/I110378019","display_name":"Southern Illinois University Carbondale","ror":"https://ror.org/049kefs16","country_code":"US","type":"education","lineage":["https://openalex.org/I110378019","https://openalex.org/I2801502357"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Dulaj Gunasinghe","raw_affiliation_strings":["School of Electrical, Computer and Biomedical Engineering, Southern Illinois University, Carbondale, IL, USA"],"affiliations":[{"raw_affiliation_string":"School of Electrical, Computer and Biomedical Engineering, Southern Illinois University, Carbondale, IL, USA","institution_ids":["https://openalex.org/I110378019"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5034492988","display_name":"Gayan Amarasuriya Aruma Baduge","orcid":"https://orcid.org/0000-0002-8871-3923"},"institutions":[{"id":"https://openalex.org/I110378019","display_name":"Southern Illinois University Carbondale","ror":"https://ror.org/049kefs16","country_code":"US","type":"education","lineage":["https://openalex.org/I110378019","https://openalex.org/I2801502357"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Gayan Amarasuriya Aruma Baduge","raw_affiliation_strings":["School of Electrical, Computer and Biomedical Engineering, Southern Illinois University, Carbondale, IL, USA"],"affiliations":[{"raw_affiliation_string":"School of Electrical, Computer and Biomedical Engineering, Southern Illinois University, Carbondale, IL, USA","institution_ids":["https://openalex.org/I110378019"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5092934253"],"corresponding_institution_ids":["https://openalex.org/I110378019"],"apc_list":null,"apc_paid":null,"fwci":1.6021,"has_fulltext":false,"cited_by_count":12,"citation_normalized_percentile":{"value":0.8361912,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":96,"max":100},"biblio":{"volume":"19","issue":null,"first_page":"2664","last_page":"2679"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11458","display_name":"Advanced Wireless Communication Technologies","score":0.9991000294685364,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11458","display_name":"Advanced Wireless Communication Technologies","score":0.9991000294685364,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":0.9857000112533569,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7830416560173035},{"id":"https://openalex.org/keywords/eavesdropping","display_name":"Eavesdropping","score":0.6592012047767639},{"id":"https://openalex.org/keywords/secrecy","display_name":"Secrecy","score":0.5708292722702026},{"id":"https://openalex.org/keywords/fading","display_name":"Fading","score":0.560845136642456},{"id":"https://openalex.org/keywords/artificial-noise","display_name":"Artificial noise","score":0.5339516401290894},{"id":"https://openalex.org/keywords/detector","display_name":"Detector","score":0.5262136459350586},{"id":"https://openalex.org/keywords/base-station","display_name":"Base station","score":0.5174577832221985},{"id":"https://openalex.org/keywords/mimo","display_name":"MIMO","score":0.5171419978141785},{"id":"https://openalex.org/keywords/transmitter-power-output","display_name":"Transmitter power output","score":0.4746987223625183},{"id":"https://openalex.org/keywords/channel-state-information","display_name":"Channel state information","score":0.4277244210243225},{"id":"https://openalex.org/keywords/interference","display_name":"Interference (communication)","score":0.4184982478618622},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.41750386357307434},{"id":"https://openalex.org/keywords/false-alarm","display_name":"False alarm","score":0.4118221700191498},{"id":"https://openalex.org/keywords/channel","display_name":"Channel (broadcasting)","score":0.40929850935935974},{"id":"https://openalex.org/keywords/real-time-computing","display_name":"Real-time computing","score":0.37790629267692566},{"id":"https://openalex.org/keywords/wireless","display_name":"Wireless","score":0.2833026945590973},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.23468074202537537},{"id":"https://openalex.org/keywords/transmitter","display_name":"Transmitter","score":0.21800857782363892},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.18463799357414246},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.11245390772819519}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7830416560173035},{"id":"https://openalex.org/C2776788033","wikidata":"https://www.wikidata.org/wiki/Q320769","display_name":"Eavesdropping","level":2,"score":0.6592012047767639},{"id":"https://openalex.org/C2776452267","wikidata":"https://www.wikidata.org/wiki/Q1503443","display_name":"Secrecy","level":2,"score":0.5708292722702026},{"id":"https://openalex.org/C81978471","wikidata":"https://www.wikidata.org/wiki/Q1196572","display_name":"Fading","level":3,"score":0.560845136642456},{"id":"https://openalex.org/C2780909371","wikidata":"https://www.wikidata.org/wiki/Q4801092","display_name":"Artificial noise","level":4,"score":0.5339516401290894},{"id":"https://openalex.org/C94915269","wikidata":"https://www.wikidata.org/wiki/Q1834857","display_name":"Detector","level":2,"score":0.5262136459350586},{"id":"https://openalex.org/C68649174","wikidata":"https://www.wikidata.org/wiki/Q1379116","display_name":"Base station","level":2,"score":0.5174577832221985},{"id":"https://openalex.org/C207987634","wikidata":"https://www.wikidata.org/wiki/Q176862","display_name":"MIMO","level":3,"score":0.5171419978141785},{"id":"https://openalex.org/C65422117","wikidata":"https://www.wikidata.org/wiki/Q358527","display_name":"Transmitter power output","level":4,"score":0.4746987223625183},{"id":"https://openalex.org/C148063708","wikidata":"https://www.wikidata.org/wiki/Q5072511","display_name":"Channel state information","level":3,"score":0.4277244210243225},{"id":"https://openalex.org/C32022120","wikidata":"https://www.wikidata.org/wiki/Q797225","display_name":"Interference (communication)","level":3,"score":0.4184982478618622},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.41750386357307434},{"id":"https://openalex.org/C2776836416","wikidata":"https://www.wikidata.org/wiki/Q1364844","display_name":"False alarm","level":2,"score":0.4118221700191498},{"id":"https://openalex.org/C127162648","wikidata":"https://www.wikidata.org/wiki/Q16858953","display_name":"Channel (broadcasting)","level":2,"score":0.40929850935935974},{"id":"https://openalex.org/C79403827","wikidata":"https://www.wikidata.org/wiki/Q3988","display_name":"Real-time computing","level":1,"score":0.37790629267692566},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.2833026945590973},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.23468074202537537},{"id":"https://openalex.org/C47798520","wikidata":"https://www.wikidata.org/wiki/Q190157","display_name":"Transmitter","level":3,"score":0.21800857782363892},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.18463799357414246},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.11245390772819519}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tifs.2023.3318941","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2023.3318941","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":39,"referenced_works":["https://openalex.org/W1518945650","https://openalex.org/W1733425272","https://openalex.org/W1972485395","https://openalex.org/W2007529001","https://openalex.org/W2072184935","https://openalex.org/W2156214717","https://openalex.org/W2413573154","https://openalex.org/W2530073819","https://openalex.org/W2801889839","https://openalex.org/W2805166665","https://openalex.org/W2945534522","https://openalex.org/W2963121727","https://openalex.org/W2964344119","https://openalex.org/W2971766018","https://openalex.org/W2981096252","https://openalex.org/W3009905270","https://openalex.org/W3011830499","https://openalex.org/W3039402952","https://openalex.org/W3040433108","https://openalex.org/W3048090405","https://openalex.org/W3084194173","https://openalex.org/W3087782700","https://openalex.org/W3117633996","https://openalex.org/W3126686235","https://openalex.org/W3136885918","https://openalex.org/W3137691847","https://openalex.org/W3152961272","https://openalex.org/W3162752845","https://openalex.org/W3172574605","https://openalex.org/W3184496427","https://openalex.org/W3211304744","https://openalex.org/W3216949739","https://openalex.org/W4225818210","https://openalex.org/W4250589301","https://openalex.org/W4251742697","https://openalex.org/W4285116458","https://openalex.org/W4312771602","https://openalex.org/W4315630350","https://openalex.org/W4315778600"],"related_works":["https://openalex.org/W1993671760","https://openalex.org/W2376754011","https://openalex.org/W3026778509","https://openalex.org/W2462883630","https://openalex.org/W2951619176","https://openalex.org/W4287776800","https://openalex.org/W3188430173","https://openalex.org/W3116845106","https://openalex.org/W4285103104","https://openalex.org/W2183269049"],"abstract_inverted_index":{"The":[0,101,143,173],"active":[1,58,85,135,177,192],"pilot":[2,59,86,136,178],"contamination":[3,137],"attacks":[4,138,179],"in":[5,35,183],"intelligent":[6],"reflecting":[7],"surface":[8],"(IRS)":[9],"aided":[10],"massive":[11],"multiple-input":[12],"multiple-output":[13],"systems":[14],"are":[15,89],"investigated.":[16],"By":[17],"proposing":[18],"a":[19],"statistical":[20],"channel":[21],"state":[22],"information":[23],"based":[24,91],"IRS":[25,74],"phase-shift":[26],"optimization":[27],"technique,":[28],"an":[29],"achievable":[30],"secrecy":[31,123,163],"rate":[32,124,129,164],"is":[33,81,106],"derived":[34],"the":[36,70,93,110,128,132,153,161,166],"presence":[37],"of":[38,103,112,115,165,176,191],"practical":[39],"impediments,":[40],"including":[41],"erroneously":[42],"estimated":[43],"composite":[44],"channels":[45],"via":[46],"linear":[47],"minimum":[48,162],"mean":[49],"square":[50],"error":[51],"estimation":[52],"criterion,":[53],"residual":[54],"interference":[55],"due":[56],"to":[57,170,187],"contamination,":[60],"artificial":[61],"noise":[62],"(AN)":[63],"generation,":[64],"and":[65,73,95,118,156],"spatially":[66],"correlated":[67],"fading":[68],"at":[69],"base-station":[71],"antennas":[72],"elements.":[75],"A":[76],"transmit":[77,150],"power":[78,145],"allocation":[79,146],"technique":[80],"also":[82],"proposed.":[83],"Two":[84],"attack":[87],"detectors":[88,105,175],"designed":[90],"on":[92],"Neyman-Pearson":[94],"generalized":[96],"likelihood":[97],"ratio":[98],"test":[99],"criteria.":[100],"performance":[102],"these":[104],"investigated":[107],"by":[108,134],"deriving":[109],"probability":[111,114],"detection,":[113],"false":[116],"alarm,":[117],"receiver":[119],"operating":[120],"characteristics.":[121],"Our":[122],"analysis":[125],"reveals":[126],"that":[127],"leaked":[130],"into":[131],"eavesdroppers":[133],"can":[139],"be":[140,181],"considerably":[141],"high.":[142],"proposed":[144,174],"algorithm":[147],"jointly":[148],"assigns":[149],"powers":[151],"for":[152,159],"legitimate":[154,168],"signals":[155],"AN":[157],"sequences":[158],"maximizing":[160],"weakest":[167],"user":[169],"ensure":[171],"user-fairness.":[172],"may":[180],"useful":[182],"designing":[184],"remedial":[185],"techniques":[186],"mitigate":[188],"detrimental":[189],"effects":[190],"eavesdropping.":[193]},"counts_by_year":[{"year":2026,"cited_by_count":4},{"year":2025,"cited_by_count":5},{"year":2024,"cited_by_count":3}],"updated_date":"2026-02-27T16:54:17.756197","created_date":"2025-10-10T00:00:00"}
