Please use this identifier to cite or link to this item:
https://hdl.handle.net/20.500.11851/11597
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Rivetti, S. | - |
dc.contributor.author | Demir, O.T.G. | - |
dc.contributor.author | Bjornson, E. | - |
dc.contributor.author | Skoglund, M. | - |
dc.date.accessioned | 2024-06-19T14:55:33Z | - |
dc.date.available | 2024-06-19T14:55:33Z | - |
dc.date.issued | 2024 | - |
dc.identifier.issn | 2162-2337 | - |
dc.identifier.uri | https://doi.org/10.1109/LWC.2024.3395831 | - |
dc.identifier.uri | https://hdl.handle.net/20.500.11851/11597 | - |
dc.description.abstract | Reconfigurable intelligent surfaces (RISs) have demonstrated significant potential for enhancing communication system performance if properly configured. However, a RIS might also pose a risk to the network security. In this letter, we explore the impact of a malicious RIS on a multi-user multiple-input single-output (MISO) system when the system is unaware of the RIS’s malicious intentions. The objective of the malicious RIS is to degrade the SNR of a specific UE, with the option of preserving the SNR of the other UEs, making the attack harder to detect. To achieve this goal, we derive the optimal RIS phase-shift pattern, assuming perfect channel state information (CSI) at the hacker. We then relax this assumption by introducing CSI uncertainties and subsequently determine the RIS’s phase-shift pattern using a robust optimization approach. Our simulations reveal a direct proportionality between the performance degradation caused by the malicious RIS and the number of reflective elements, along with resilience toward CSI uncertainties. IEEE | en_US |
dc.language.iso | en | en_US |
dc.publisher | Institute of Electrical and Electronics Engineers Inc. | en_US |
dc.relation.ispartof | IEEE Wireless Communications Letters | en_US |
dc.rights | info:eu-repo/semantics/closedAccess | en_US |
dc.subject | Array signal processing | en_US |
dc.subject | Computer hacking | en_US |
dc.subject | imperfect CSI | en_US |
dc.subject | Jamming | en_US |
dc.subject | malicious RIS | en_US |
dc.subject | Optimization | en_US |
dc.subject | Reconfigurable intelligent surface (RIS) | en_US |
dc.subject | Reconfigurable intelligent surfaces | en_US |
dc.subject | Signal to noise ratio | en_US |
dc.subject | SNR degradation | en_US |
dc.subject | Vectors | en_US |
dc.subject | Array processing | en_US |
dc.subject | Beamforming | en_US |
dc.subject | Channel state information | en_US |
dc.subject | Jamming | en_US |
dc.subject | Network security | en_US |
dc.subject | Optimization | en_US |
dc.subject | Personal computing | en_US |
dc.subject | Array signal processing | en_US |
dc.subject | Computer hacking | en_US |
dc.subject | Imperfect channel state information | en_US |
dc.subject | Jamming | en_US |
dc.subject | Malicious reconfigurable intelligent surface | en_US |
dc.subject | Optimisations | en_US |
dc.subject | Reconfigurable | en_US |
dc.subject | Reconfigurable intelligent surface | en_US |
dc.subject | SNR degradation | en_US |
dc.subject | Signal to noise ratio | en_US |
dc.title | Malicious Reconfigurable Intelligent Surfaces: How Impactful Can Destructive Beamforming Be? | en_US |
dc.type | Article | en_US |
dc.department | TOBB ETÜ | en_US |
dc.identifier.startpage | 1 | en_US |
dc.identifier.endpage | 1 | en_US |
dc.identifier.scopus | 2-s2.0-85192201063 | en_US |
dc.institutionauthor | Demir, O.T.G. | - |
dc.identifier.doi | 10.1109/LWC.2024.3395831 | - |
dc.authorscopusid | 57913638300 | - |
dc.authorscopusid | 55807906700 | - |
dc.authorscopusid | 24478602800 | - |
dc.authorscopusid | 23135922400 | - |
dc.relation.publicationcategory | Makale - Uluslararası Hakemli Dergi - Kurum Öğretim Elemanı | en_US |
item.grantfulltext | none | - |
item.openairetype | Article | - |
item.cerifentitytype | Publications | - |
item.fulltext | No Fulltext | - |
item.openairecristype | http://purl.org/coar/resource_type/c_18cf | - |
item.languageiso639-1 | en | - |
Appears in Collections: | Scopus İndeksli Yayınlar Koleksiyonu / Scopus Indexed Publications Collection |
CORE Recommender
Items in GCRIS Repository are protected by copyright, with all rights reserved, unless otherwise indicated.