Skip to main content
Sensors (Basel, Switzerland) logoLink to Sensors (Basel, Switzerland)
. 2022 Nov 26;22(23):9202. doi: 10.3390/s22239202

Utilizing Multi-Dimensional MmWave MIMO Channel Features for Location Verification

Pinchang Zhang 1, Yangyang Liu 2, Ji He 2,*
Editor: Davy P Gaillot
PMCID: PMC9739151  PMID: 36501903

Abstract

In this paper, we address the problem of authenticating transmitters in millimeter-wave (mmWave) multiple-input multiple-output (MIMO) communication systems, and propose a location verification scheme based on multi-dimensional mmWave MIMO channel features. In particular, we first examine the mmWave MIMO channel features in terms of azimuth angle of arrival (AAoA), elevation angle of arrival (EAoA), and path gain, and then extract these fine-grained channel features through the maximum-likelihood (ML) estimation method. Based on the extracted feature parameters, authentication validation is cast in the framework of hypothesis testing theory. We also derive the analytical expressions for the typical false alarm and detection rates by using the likelihood ratio test and thus the statistical performance is analytically established. Finally, extensive numerical results are provided to demonstrate the performance of the proposed authentication scheme.

Keywords: location verification, physical layer authentication, millimeter-wave (mmWave) communications, multiple-input multiple-output (MIMO), channel features

1. Introduction

Millimeter-wave (mmWave) multiple-input multiple-output (MIMO) systems serve as a critical technique for 5G (fifth-generation communication) and beyond wireless communication networks. The mmWave MIMO technique can lead to a significant increase in data rates, wide bandwidth, and higher spectrum efficiency. By integrating huge antenna arrays, 5G and beyond communication systems operating from 30 to 300 GHz can support huge connections among a bulk of smart devices, contributing to various applications such as the Industrial Internet of Things (IIoT) and the Internet of Vehicles (IoV).

However, mmWave MIMO communication systems may become subject to malicious attacks because of the above important applications they can support. Moreover, the mmWave wireless communication medium is open in space and thus attackers can easily access the communication network and obtain the transferred information between legitimate users and base stations. One of the main threats in mmWave MIMO systems is identity-based spoofing attack, where an attacker eavesdrops the legitimate communication links and further impersonates a legitimate transmitter to inject harmful signals into the communication network. To tackle the spoofing attacks in mmWave systems, identity authentication presents a promising solution to secure mmWave MIMO communication systems.

We note that the existing authentication schemes can be roughly divided into higher layer and physical layer authentication schemes. The higher layer authentication schemes are mainly dependent on secret keys and encryption/decryption algorithms to validate transmitter identities [1,2,3]. Meanwhile, the physical layer authentication schemes verify transmitter identities through physical layer features [4]. It is noted that the higher layer authentication may not completely adapt to the emerging mmWave MIMO systems which include distributed, dynamic and highly heterogeneous devices. Such mmWave MIMO systems may not support the cryptographic key distribution and management, high consumption of communication and computation resources in higher layer authentication schemes. As a complement and an enhancement of the higher layer authentication, physical layer authentication possesses several characteristics such as high security, low complexity and high compatibility [5]. Thus, in this paper we focus on physical layer authentication in mmWave MIMO systems.

Existing physical layer authentication schemes mainly include channel-based authentication and hardware-impairment-based authentication. The hardware-impairment-based method authenticates the legitimacy of a transmitter identity by extracting specific non-ideal hardware parameters from received signals. In contrast, channel-based authentication utilizes the fact that wireless channels decorrelate rapidly as the source (e.g., a transmitter or user using transmitter is transmitting signals to an intended destination/receiver) changes location in an environment with rich scatterers and reflectors. In fact, channel-based authentication verifies the location of the current transmitter rather than transmitter physics identity, and hence is referred to as location verification. There exists some research works on physical layer authentication for mmWave systems [6,7,8,9,10,11,12,13,14,15]. In [6], the authors propose a physical layer authentication scheme by using sparse mmWave channel. A power allocation technique for the precoder and the authentication tag is first developed for fingerprint-based authentication in a multi-user mmWave UAV network [7]. Multipath time delay caused by planar specular reflectors is acquired to illustrate the authenticity of user position 5G mmWave communication with planar reflectors [8]. The intrinsic physical attributes for 5G communications are analyzed for physical layer authentication in detail and the future possible directions for the exploitation of physical attributes is demonstrated in [9]. The authors in [10] further study the physical characteristics of 5G IoT in various application scenarios and describe the possible security threats resulting from the 5G IoT physical layer. Based on virtual angles of arrival in mmWave systems and machine learning methods, the authors in [11] propose a physical layer authentication scheme to detection spoofing attacks. Two effective pilot contamination attack detection approaches are proposed for power non-orthogonal multiple access in massive MIMO 5G communications, based on the sparseness and statistics of mmWave virtual channels [12]. Following this line, the authors in [13] present a new physical layer countermeasure using channel virtual representation to defend against pilot contamination attack. In [14], unique beam pattern features are utilized to achieve physical layer spoofing attack detection and the detection problem is cast as a machine learning classification through the sector level sweep (SLS) process. The authors in [15] develop a physical layer authentication scheme by using signal-to-noise ratio (SNR) trace features to detect spoofing attacks in mmWave systems.

Frequency-selective Rayleigh channel time variations are used to detect spoofing attacks in wireless networks, considering the channel estimation errors [16]. To improve the spoofing detection accuracy, a logistic regression-based authentication approach is developed without the requirements of the known channel model [17]. The authors jointly use multipath delay and channel gain characteristics of the channel impulse response to achieve performance improvement of physical layer authentication [18]. The above existing approaches demonstrate the uniqueness and usability of physical layer features for spoofing attack detection and authentication. It is noted that the above existing approaches are developed for spoofing detection by conventional channel state information. These approaches cannot be extended directly to mmWave MIMO communication systems because it is difficult for them to sufficiently excavate fine-grained physical layer characteristics from mmWave MIMO channels. Hardware-impairment-based authentication generally needs to employ high-precision hardware equipment for hardware feature extraction and bears high computational complexity [14,15]. Moreover, machine-learning-based authentication framework requires an expensive training stage with a large amount of training data, which might be unrealistic in practice. In addition, the analytic establishment of statistical performances still remains an open problem in machine-learning-based authentication frameworks. To this end, we explore the exploitation of multi-dimensional mmWave MIMO channel features to design a new location verification scheme for mmWave MIMO communication systems. These channel features include azimuth angle of arrival (AAoA), elevation angle of arrival (EAoA) and path gain, which are jointly used to validate the legitimacy of transmitters and to improve the authentication performance. The main difference between the schemes proposed in this paper and those in previous works [16,17,18] is that the previous approaches mainly focus on channel statistics in the time domain while this paper extracts channel features in the time domain as well as the angle domain. In addition, the scheme proposed in this paper attempts to explore the exploitation of multi-dimensional mmWave MIMO channel features to achieve location verification.

The main contributions of this paper are summarized as follows:

  • By exploiting multi-dimensional mmWave MIMO channel features in both the time domain and angle domain, we develop a new location verification scheme to achieve validation of a transmitter location for mmWave MIMO communication systems.

  • To determine estimation error variances of channel features in terms of AAoA, EAoA, and path gain, we estimate the mmWave MIMO channels based on maximum-likelihood estimation theory. To analytically evaluate the performance of our proposed location verification scheme, we derive the typical two performance metrics and the statistical performance is analytically established.

  • Extensive numerical results are provided to demonstrate that the proposed scheme achieves desired performance. Numerical results are used to further show how the system parameters can affect the statistical performance.

The remainder of this paper is organized as follows. Section 2 introduces the concerned system model and problem formulation. Section 3 and Section 4 present the proposed location verification scheme and performance analysis, respectively. Section 5 shows the numerical results and performance evaluation. Finally, Section 6 concludes this paper.

Notation: (·)H, (·)T, (·), (·)1, (·) denote the conjugate-transpose, transpose, conjugate, inverse and pseudo-inverse of a matrix, respectively. The (m,n)-th element of a matrix H is Hm,n. diag(a1,...,aN) is a diagonal matrix with a1,...,aN on the main diagonal. vec(H) is the vectorization of matrix H. tr(·) and ≜ represent the matrix trace function and definitions, respectively. E{·} represents the expectation operator. ||·||2 is the Euclidean norm operator. A Gaussian random variable x with mean μ and variance c can be represented by xN(μ,c). If let X be the subspace spanned by the columns of matrix X, then PX denotes the orthogonal projection matrix onto X, that is, PX=X(XHX)1XH.

2. Problem Formulation and System Model

2.1. Problem Formulation

Similar to previous works [16,17,18], we also use a three-entity model including a legitimate transmitter (Alice), a malicious attacker (Eve) and a legitimate base station (Bob), where Alice and Eve are both equipped with a single antenna and Bob is equipped with Nr antennas, as shown in Figure 1. Eve intends to spoof Bob by using the identity of Alice and thus may launch some more advanced attacks, such as a man-in-the-middle attack and session hijacking attack while Alice communicates with Bob.

Figure 1.

Figure 1

System model.

Suppose Alice transmits one data frame to Bob at time t1 and this data frame was validated by cryptography-based higher layer authentication approaches. In this process, Bob measures and stores physical layer features information, e.g., mmWave MIMO channel features, with the help of signal estimation techniques. Subsequently, at time t, an unknown transmitter (either Alice or Eve) sends another data frame to Bob and Bob needs to validate the data frame origin (i.e., the current transmitter identity) to avoid impersonation attack.

Eve has data frame structure information by probing the transmitted signals between Alice and Bob and some publicly known information (e.g., training sequences and pilot signals). The estimation techniques and authentication schemes that Bob utilizes cannot be known by the attacker, Eve. Further, we exploit the carrier sense multiple access/collision detection protocol.

2.2. Channel Model

Bob has a Nr-antenna uniform planar array (UPA) where the numbers of antennas in the horizon and vertical directions are M and N, respectively, where Nr=MN. The number of radio frequency chains of Bob is MRF [19]. Let d be the distance between any arbitrary two adjacent antennas, and GRF be the analog beamformer equipped at Bob. Considering the limited scattering characteristics of the mmWave communication environments, we here adopt the extended Saleh-Valenzuela (SV) model to characterize the mmWave MIMO channels [20,21]. Denote ϕl as the azimuth angle of arrival (AAoA) of the l-th propagation multipath of the transmitter and θl as the elevation angle of arrival (EAoA) of that, for l=1,2,,L, respectively. We assume ϕlN(0,σϕl,XB2) and θlN(0,σθl,XB2). The steering matrix A(ϕl,θl) is expressed by

A(ϕl,θl)=1MN1ej2πd/λ(N1)sinϕlcosθlej2πd/λ(M1)cosϕlej2πd/λ((M1)cosϕl+(N1)sinϕlcosθl), (1)

where λ is the wavelength of the carrier signal [22]. For simplicity, let v1,l=2πdλcosϕl and v2,l=2πdλsinϕlcosθl. The steering matrix A(ϕl,θl) can be further written as

A(ϕl,θl)=A(v1,l,v2,l)=a(v1,l)aT(v2,l), (2)

where a(v1,l)=1M[1,,ej(M1)v1,l]T and a(v2,l)=1N[1,,ej(N1)v2,l]T.

Similar to [23], the mmWave channel with L being the number of propagation paths is modeled as

H=1Ll=1LαlA(ϕl,θl)=1Ll=1Lαla(v1,l)aT(v2,l)=1LAv1HαAv2T, (3)

where Av1=[a(v1,1),a(vv1,2),,a(v1,L)], Av2=[a(v2,1),a(vv2,2),,a(v2,L)], Hα=diag(α1,α2,,αL) and αlCN(0,σαl,XB2) is the path gain of the l-th propagation path [22,24,25].

The (m,n)-th element (m=0,1,,M1 and n=0,1,,N1) for matrix H is

Hm,n=1LMNl=1Lαlej(mv1,l+nv2,l). (4)

Path gain is assumed to keep unchanged during one frame [26]. Based on [27], we use first-oder Gauss–Markov process to model the time-varying path gain as

αl(t)=ρααl(t1)+1ρα2uαl(t), (5)

where ρα is the path gain correlation coefficient [28] and uαl(t) is zero-mean Gaussian noise, i.e., uαl(t)CN(0,σαl,XB2).

Similarly, we use first-order Gauss–Markov process to model the time-varying azimuth angle of arrival as

ϕl(t)=ρϕϕl(t1)+1ρϕ2uϕl(t), (6)

where ρϕ is the AAoA correlation coefficient [28] and uϕl(t) is zero-mean Gaussian noise, i.e., uϕl(t)N(0,σϕl,XB2). We also use first-order Gauss–Markov process to model the time-varying elevation angle of arrival as

θl(t)=ρθθl(t1)+1ρθ2uθl(t), (7)

where ρθ is the EAoA correlation coefficient [28] and uθl(t) is zero-mean Gaussian noise, i.e., uθl(t)N(0,σθl,XB2).

Channel-based verification utilizes the fact that wireless channels decorrelate rapidly as the source (e.g., a transmitter or user using transmitter is transmitting signals to an intended destination/receiver) changes location in an environment with rich scatterers and reflectors. This indicates that wireless channel features are spatially decorrelated between different geographic locations. When the distance between a legitimate source and an adversary is greater than half of the wavelength, it is extremely difficult for the adversary to obtain the accurate wireless channel features. Although the channel-based method essentially authenticates the practical geographic location related to the inherent properties of channel features, it is an effective authentication to achieve legitimacy validation of the source identity. Therefore, this paper aims to design a new location verification scheme for validating data frame origin to resist against the impersonation attack.

2.3. Communication Model

The baseband signal received by Bob at time t is written as

r(t)=GRFHvec(HXB(t))s(t)+n(t), (8)

where

  • s(t) is the transmitted signal at time t. The signal power is p=E{|s(t)|2}.

  • HXB(t) denotes the channel matrix between transmitter X (either Alice or Eve) and receiver Bob.

  • n(t) is a zero-mean complex additive white Gaussian noise (AWGN), i.e., n(t)CN(0,σn2I).

3. Proposed Location Verification Scheme

3.1. Estimation of MmWave Channels

To exploit the fine-grained mmWave channel features, we estimate the channel parameters separately. We first estimate AAoA and EAoA, and then estimate the mmWave path gain. We can write the estimations of ϕl,XB(t), θl,XB(t) and αl,XB(t), respectively, as

ϕ^l,XB(t)=ϕl,XB(t)+Δϕl(t), (9)
θ^l,XB(t)=θl,XB(t)+Δθl(t), (10)
α^l,XB(t)=αl,XB(t)+Δαl(t), (11)

where ΔϕN(0,σΔϕ2), ΔθN(0,σΔθ2) and ΔαCN(0,σΔα2) are the corresponding estimation errors, respectively. Next, we calculate the variances of the estimation errors, i.e., σΔϕ2, σΔθ2 and σΔα2.

For notational simplicity, here we ignore the time index t and the path index l. The signal received by Bob at time t is given by

r=GRFHvec(H)s+n=GRFHvec(A)αs+n, (12)

where A is the M×N steering matrix with its (m,n)-th element given by

Am,n=1MNej(mv1+nv2). (13)

The conditional PDF of r is expressed by

f(r|v1,v2,α)=1(πσn2)MRFexp||rGRFHvec(A)αs||2σn2. (14)

The maximum-likelihood (ML) method in [29] is used to estimate mmWave channel features v1, v2, and α. The estimation of these features can be expressed as

[v1^,v2^,α^]=argmaxv1,v2,αf(r|v1,v2,α). (15)

Based on (14) and (15), we can equivalently write (15) as

[v1^,v2^,α^]=argminv1,v2,α||rGRFHvec(A)αs||2. (16)

When giving v1 and v2, the estimation of α is calculated as

α^=vec(A)H(GRFH)sr. (17)

Substituting (17) into (16), the estimations of v1 and v2 is written as

[v1^,v2^]=argminv1,v2||rGRFHvec(A)vec(A)H(GRFH)srs||2argmaxv1,v2rHGRFHPb(GRFH)r=argmaxv1,v2g(v1,v2), (18)

where g(v1,v2) is the cost function related to v1 and v2, σs2=ss is the signal power and Pb=vec(A)vec(A)H.

Next, we give Lemma 1 regarding the variance of the estimations for v1 and v2.

Lemma 1. 

The variance of the estimations for v1 and v2 in (18) are given by

cΔvk=σn22σs2|α|2vec(A)HVkPbVkvec(A),k=1,2, (19)

where Pb=IPb. V1 and V2 are the diagonal matrices given by

V1=diag(0.,0N,,(M1),,(M1)N), (20)
V2=diag(0.,0M,,(N1),,(N1)M). (21)

Proof. 

The received signal without noise can be written as

rs=GRFHvec(A)αs. (22)

When considering the receiver noise, the received signal can be further written as r=rs+n. By using Taylor series expansion, the first derivative of the cost function g(v1,v2) is given by

g(v1,v2)vk|ve=v^kg(v1,v2)vk|ve=v^k+2g(v1,v2)2vk|ve=v^kΔvk, (23)

where Δvk=v^kvk denotes perturbation on vk.

Setting (23) equal to zero, Δvk is given by

Δvk=g(v1,v2)vk|ve=v^k2g(v1,v2)2vk|ve=v^k=g˙(v1,v2|vk)g¨(v1,v2|vk), (24)

where g˙(v1,v2|vk) and g¨(v1,v2|vk) are the first- and second-order derivatives of the cost function g(v1,v2) conditioned on vk, respectively.

g˙(v1,v2|vk) is expressed as

g˙(v1,v2|vk)=jrHGRFHVkPb(GRFH)rjrHGRFHPbVk(GRFH)r. (25)

By substituting (22) into (25), g˙(v1,v2|vk) in (25) becomes

g˙(v1,v2|vk)=j(rs+n)HGRFHVkPb(GRFH)(rs+n)j(rs+n)HGRFHPbWe(GRFH)(rs+n)=2{rsHGRFHVkPb(GRFH)n}2{nHGRFHVkPb(GRFH)n}. (26)

Due to the independence between n and rs, we have

E{g˙(v1,v2|vk)}=2σn2{tr{GRFHVkPb(GRFH)}}=0. (27)

The second-order conditional derivative g¨(v1,v2|vk) with respect to vk is written as

g¨(v1,v2|vk)=rHGRFHVk2Pb(GRFH)n+rHGRFHVkPbVk(GRFH)r+rHGRFHVkPbVk(GRFH)rnHGRFHPbVk2(GRFH)r. (28)

Similarly, E{g¨(v1,v2|vk)} is calculated as

E{g¨(v1,v2|vk)}=2rsHGRFHVkPbVk(GRFH)rs+E{tr(Vk2Pb+2VkPbVkPbVk2)}=2σs2|α|2vec(A)HVkPbVkvec(A). (29)

Based on (28) and (29), g¨(v1,v2|vk) is further written as

g¨(v1,v2|vk)=E{g¨(v1,v2|vk)}+f2(n)+f2(n2), (30)

where f2(n) and f2(n2) represent the linear and quadrature functions of n in g¨(v1,v2|vk), respectively. g˙(v1,v2|vk) can be written as

g˙(v1,v2|vk)=f1(n)+f1(n2), (31)

where f1(n) and f1(n2) are the linear and quadrature functions of n in g˙(v1,v2|vk), respectively.

Substituting (30) and (31) into (24), Δvk in (24) can be rewritten as

Δvk=f1(n)+f1(n2)E{g¨(v1,v2|vk)}+f2(n)+f2(n2)=f1(n)+f1(n2)E{g¨(v1,v2|vk)}1f2(n)+f2(n2)E{g¨(v1,v2|vk)}+f2(n)+f2(n2)E{g¨(v1,v2|vk)}2f1(n)+f1(n2)E{g¨(v1,v2|vk)}=g˙(v1,v2|vk)E{g¨(v1,v2|vk)}. (32)

cΔvk is expressed by

cΔvk=E{g˙(v1,v2|vk)2}E{g¨(v1,v2|vk)}2, (33)

where

E{g˙(v1,v2|vk)2}2σn2rsHGRFHVkPbVk(GRFH)rs=2σs2σn2|α|2vec(A)HVkPbVkvec(A). (34)

Substituting (27), (29) and (34) into (33) yields (19). □

Using the formulations of v1 and v2 in Section 2.2, ϕ and θ are written, respectively, as

ϕ=cos1λv12πd, (35)
θ=cos1λv22πdsinϕ. (36)

Based on (19), (35) and (36), E{Δϕ}=E{Δθ}=0, and E{Δϕ2} is expressed as

cΔϕ=E{(ϕ^ϕ)(ϕ^ϕ)H}=λ2πd21λv12πd2σn22σs2|α|2vec(A)HV1PbV1vec(A), (37)
cΔθ=E{(θ^θ)(θ^θ)H}=(λ2πdsinϕ)21(λv22πdsinϕ)2σn22σs2|α|2vec(A)HV2PbV2vec(A). (38)

Based on (17), α^ is rewritten as

α^=vec(A^)H(GRFH)s(GRFHvec(A)αs+n)=σs2vec(A^)Hvec(A)α+vec(A^)H(GRFH)sn, (39)

where vec(A^)H is calculated by the estimation of (v^1,v^2). By using Taylor’s expansion, we approximate vec(A^)H as

vec(A^)Hvec(A)+jvec(A)HVkΔvk,k=1,2. (40)

Substituting (40) into (39), α^ in (39) can be written as

α^=σs2(vec(A)H+jvec(A)HV1Δv1)vec(A)α+vec(A^)H(GRFH)sn=α+jvec(A)HV1vec(A)Δv1α+vec(A^)H(GRFH)sn. (41)

Based on (19), the statistical characteristics of the estimation error of the mmWave path gain is calculated as

μΔα=E{Δα}=E{jvec(A)HV1vec(A)Δv1α+vec(A^)H(GRFH)sn}=0, (42)
cΔα=E{(α^α)(α^α)H}=σn2|vec(A)HV1vec(A)|22σs2vec(A)HV1PbV1vec(A)+σn2. (43)

3.2. Location Validation

The location validation is implemented by comparing the similarity between the current channel parameters and the previous ones with preset thresholds, based on a binary hypothesis test. If we denote the difference between the current channel parameters (i.e., ϕ,α,θ) at successive time as Θζ for ζ{ϕ,α,θ}, then we have

Θζ=l=1Lζ^l,XB(t)ζ^l,AB(t1)2,ζ{ϕ,α,θ}. (44)

Let ηϕ, ηθ and ηα be preset thresholds for AAoA, EAoA and path gain, respectively. Next, we design a simple binary hypothesis testing for location validation as

H0:Θζηζ,ζ{ϕ,α,θ},H1:Θζ>ηζ,ζ{ϕ,α,θ}, (45)

Under H0, the current transmitter is Alice. In contrast, H1 means that the current transmitter is Eve.

The fundamental principle for the proposed scheme in this paper is that location validation decision is implemented by comparing the similarities between current estimated channel features at time t and previous ones at time t1 with the corresponding preset thresholds, based on the framework of hypothesis testing theory. Channel statistics and the temporal values for AAoA, EAoA and path gain at time t1, and correlation coefficients can be modeled as side information that is known at both the transmitter (Alice) and the legitimate receiver (Bob), but not the adversary (Eve). The legitimate transmitter (Alice) and intended legitimate receiver (Bob) cooperate to secure communication transmission by means of the knowledge of this side information; this is beneficial for both partners. It should be stressed that the validation and efficiency of this idea were already studied from an information-theoretical point-of-view in [30], and the work [30] also provided the right guidance to the appropriate code design in practice.

4. Performance Analysis

In this section, we focus on the modeling of false alarm rate (denoted by Pf) and detection rate (denoted by Pd). To facilitate the calculation of the two probabilities, we denote PΘζ,Hi the probability of (Θζ>ηζ) under Hi for i=1,2 and ζ{ϕ,α,θ}, and we consider σζl,AB2=σζAB2, and σζl,EB2=σζEB2. Based on authentication decision in (45), we establish the following lemmas regarding the probability PΘζ,Hi.

Lemma 2. 

Based on (44) and (45), PΘϕ,H0 is expressed by

PΘϕ,Hi=expηϕ2σϕ,Hi2z=0L211z!ηϕ2σϕ,Hi2z, (46)

where σϕ,H02=2(1ρϕ)σϕAB2+2σΔϕ2 and σϕ,H12=σϕEB2+σϕAB2+2σΔϕ2.

Proof. 

To calculate the probability distribution of Θϕ in (44), we define Λϕ as

Λϕϕ^l,XB(t)ϕ^l,AB(t1). (47)

Under H0, by substituting (9) into (47), ΛϕH0 is obtained as

ΛϕH0=ϕ^l,AB(t)ϕ^l,AB(t1)=(ρϕ1)ϕl,AB(t1)+1ρϕ2uϕ,l,XB(t)+Δϕl(t)Δϕl(t1). (48)

One can see that ΛϕH0 is a zero-mean Gaussian distribution with variance σϕ,H02=2(1ρϕ)σϕAB2+2σΔϕ2. Therefore, Θϕ under H0 is a central chi-square distribution random variable and the PDF of Θϕ under H0 is then written as

fΘϕ,H0(x)=x2σϕ,H02L212σϕ,H02Γ(L/2)expx2σϕ,H02,x0, (49)

where Γ(·) is a Gamma function. The CDF of Θϕ under H0 is written as

FΘϕ,H0(x)=1expx2σϕ,H02z=0L211z!x2σϕ,H02z. (50)

Accordingly, PΘϕ,H0 is written as

PΘϕ,H0=Pr{Θϕ>ηϕ|H0}=expηϕ2σϕ,H02z=0L211z!ηϕ2σϕ,H02z. (51)

Similarly, based on (47), we derive ΛϕH1 under hypothesis H1 as

ΛϕH1=ϕ^l,EB(t)ϕ^l,AB(t1)=ϕl,EB(t)+Δϕl(t)ϕl,AB(t1)Δϕl(t1). (52)

Because ϕl,EB(t), Δϕl(t), ϕl,AB(t1) and Δϕl(t1) are independent zero-mean Gaussian random variables with variances σϕl,EB2, σΔϕ2, σϕl,AB2 and σΔϕ2, respectively, and then the PDF of Θϕ under H1 is written as

fΘϕ,H1(x)=x2σϕ,H12L212σϕ,H12Γ(L/2)expx2σϕ,H12,x0, (53)

where σϕ,H12=σϕEB2+σϕAB2+2σΔϕ2. Then, the CDF of Θϕ under H1 is written as

FΘϕ,H1(x)=1expx2σϕ,H12z=0L211z!x2σϕ,H12z. (54)

According to (54), PΘϕ,H1 is written as

PΘϕ,H1=Pr{Θϕ>ηϕ|H1}=expηϕ2σϕ,H12z=0L211z!ηϕ2σϕ,H12z. (55)

Lemma 3. 

Using (45), PΘθ,Hi (i=1,2) is evaluated as

PΘθ,Hi=expηθ2σθ,Hi2z=0L211z!ηθ2σθ,Hi2z, (56)

where σθ,H02=2(1ρθ)σθAB2+2σΔθ2 and σθ,H12=σθEB2+σθAB2+2σΔθ2.

Lemma 4. 

Using (45), PΘα,Hi (i=1,2) is evaluated as

PΘα,Hi=expηα2σα,Hi2z=0L11z!ηα2σα,Hi2z, (57)

where σα,H02=2(1ρα)σαAB2+2σΔα2 and σα,H12=σαEB2+σαAB2+2σΔα2.

Based on the above lemmas, we can establish the following theorem regarding the closed expressions of Pf and Pd.

Theorem 1. 

For the mmWave MIMO communication model shown in Figure 1, Pf and Pd of the proposed authentication scheme are determined, respectively, as

Pf=PΘϕ,H0PΘθ,H0PΘα,H0, (58)
Pd=1(1PΘϕ,H1)(1PΘθ,H1)(1PΘα,H1). (59)

Suppose that Bob has no knowledge of the channel parameters from data frame at time t such as ζ^l,AB(t1) and ρζ for ζ{ϕ,α,θ}, l=1,...,L. In this case Θζ becomes

Θζ=l=1Lζ^l,XB(t)2,ζ{ϕ,α,θ}. (60)

Following similar steps for the derivation of PΘζ,Hi, we can obtain PΘζ,Hiu with u being without the knowledge of channel parameters at time t1, and then we have

PΘϕ,Hiu=expηϕ2σϕ,Hi2z=0L211z!ηϕ2σϕ,Hi2z, (61)
PΘθ,Hiu=expηθ2σθ,Hi2z=0L211z!ηθ2σθ,Hi2z, (62)
PΘα,Hiu=expηα2σα,Hi2z=0L11z!ηα2σα,Hi2z, (63)

where σϕ,H02=σϕAB2+σΔϕ2, σϕ,H12=σϕEB2+σΔϕ2, σθ,H02=σθAB2+σΔθ2, σθ,H12=σθEB2+σΔθ2, σα,H02=σαAB2+σΔα2, and σα,H12=σαEB2+σΔα2. In this case, Pfu and Pdu of the proposed authentication scheme are determined, respectively, as

Pfu=PΘϕ,H0uPΘθ,H0uPΘα,H0u, (64)
Pdu=1(1PΘϕ,H1u)(1PΘθ,H1u)(1PΘα,H1u). (65)

Suppose that legitimate Alice and adversary Eve transmit signals to Bob with equal probability. We use Ps to denote the secrecy rate improvement afforded by the knowledge of data frame at time t1 for both legitimate transmitter and receiver, relative to the case in which the knowledge is not used. Then, Ps can be calculated as

Ps=12(PfuPf+PdPdu) (66)

5. Numerical Results

5.1. System Parameters and Simulation Settings

Let signal-to-noise ratio (SNR) denote as SNR=pσn2 and kϕ=σϕl,EB2σϕl,AB2 be the ratio of Eve’s and Alice’s AAoA variances. We use kθ=σθl,EB2σθl,AB2 to denote the ratio of Eve’s and Alice’s EAoA variances, and kα=σαl,EB2σαl,AB2 to denote the ratio of Eve’s and Alice’s path gain variances. We set the number of the receiver antennas as Nr=M×N. In the simulations, the first frame is validated based on a higher layer verification scheme and the second frame is validated by using the proposed location verification scheme.

5.2. Impact of SNR on the Verification Performance

We plot in Figure 2 ROC (receiver operating characteristic, ROC) variations under the settings of (Nr = 128, L = 20, kϕ = 2 dB, kθ = 2 dB, kα = 2 dB) at different SNRs. From Figure 2, we can see that the authentication performance (Pf and Pd) under SNR = 5 dB outperforms that of the others and the performance for SNR = −5 dB is poorest. This indicates that the SNRs have severe impacts on the authentication performance. One can improve the authentication performance by setting a higher SNR. However, the SNR level usually has a limit due to the practical conditions. In many practical environments, Pf<0.1 and Pd>0.9 are usually a required constraint pair to satisfy the requirements of a practical authentication system. As shown in Figure 2, the authentication performance (Pf and Pd) for SNR = 0 dB and SNR = 5 dB can satisfy the practical requirements and the performance at SNR = 5 dB is best. From Figure 2, we also can see that when Pf is fixed, Pd increases when SNR increases. This means that a higher SNR can lead to a better authentication performance.

Figure 2.

Figure 2

ROC curves under different SNRs with the settings of (Nr = 128, L = 20, kϕ = 2 dB, kθ = 2 dB, kα = 2 dB).

5.3. Impact of the Number of Antennas on the Authentication Performance

We show in Figure 3 the ROC results under different receiver antenna numbers with the settings of (SNR = 10 dB, L = 20, kϕ = 2 dB, kθ = 2 dB, kα = 2 dB). From Figure 3, we can see that the authentication performance (Pf, Pd) under 64 receiver antennas outperforms that of the others, and the performance under 16 receiver antennas is poorest. This is because multiple antennas can improve feature dimensions and further improve the authentication performance. When Pf is fixed, Pd increases when the number of receiver antennas increases. Moreover, the authentication performance (Pf, Pd) under 64 receiver antennas can satisfy the practical authentication requirements.

Figure 3.

Figure 3

ROC curves under different numbers of receiver antennas with the settings of (SNR = 10 dB, L = 20, kϕ = 2 dB, kθ = 2 dB, kα = 2 dB).

5.4. Impact of the Number of Multipaths on the Authentication Performance

We show in Figure 4 the ROC curves under different numbers of multipaths with the settings of (SNR = 10 dB, Nr = 64, kϕ = 2 dB, kθ = 2 dB, kα = 2 dB). From Figure 4, we can see that the authentication performance (Pf, Pd) under L = 15 multipaths outperforms that of the others, and the performance under L = 5 multipaths is poorest. This means that more multipaths can contribute to the authentication performance. We can also see that when Pf is fixed, Pd increases when the number of multipaths increases.

Figure 4.

Figure 4

ROC curves under different numbers of multipaths with the settings of (SNR = 10 dB, Nr = 64, kϕ = 2 dB, kθ = 2 dB, kα = 2 dB).

5.5. Impact of kα on the Authentication Performance

To investigate the impact of the distance between Eve–Bob and Alive–Bob on performance, we need to characterize σαl,XB2 being the variance of the path gain of the l-th propagation path from the transmitter X to Bob. According to [31], baseband path gain αl,XB is written as αl,XB=βl,XBexp(j2πfcdl,XBc), where βl,XB is the attenuation coefficient of l-th propagation path and fc is carrier frequency. According to the Central Limit Theorem, the path gain can be modeled as a zero-mean complex circular symmetric Gaussian process and for large-scale fading channels, σαl,XB2 can be modeled by applying ([32], Chapter 2), as

σαl,XB2=Kd0dl,XBςΩ, (67)

where K is a reference path gain value; d0 is a reference distance for antenna far-field; ς is a path loss exponent ranging between 2 and 5 in free space propagation wireless environments; and Ω is a shadowing factor modeled as a log-normal random variable. Because the distance between the transmitter and receiver is much larger than antenna separation, we can use the approximation dl,XBdL,XB=dXB for X={A,E}. From (67), we have σα1,XB2σαL,XB2=σαXB2. Both Alice and Eve are assumed to be randomly deployed at arbitrary locations in a circular area centered on Bob, and there is no shadow fading in that area. By using (67), kα by dB value without shadow fading is given by kα=10ςlogdABdEB. We make an assumption (without loss of generality) that Alice is in a fixed location, i.e., dAB is a constant and we adjust the distance between Eve and Bob dEB to obtain different kα.

We show in Figure 5 how Pd varies with kα under different Pfs and with the settings of (SNR = 10 dB, Nr = 128, L = 25, kϕ = 2 dB, kθ = 2 dB). From Figure 5, Pd increases when kα increases for a given Pf. This clearly indicates that if Eve is closer to Bob, she might be successfully detected by Bob, and Eve might select an appropriate location in which she has a high probability of succesfully impersonating Alice. In addition, the authentication performance under Pf = 0.08 outperforms that of the others, and the performance under Pf = 0.02 is poorest. This is because a lower Pf value means a stricter performance requirement and there would be a trade-off between Pd and Pf. We can also see from Figure 5 that when kα is fixed, Pd increases when Pf increases.

Figure 5.

Figure 5

Pd vs. kα with the settings of (SNR = 10 dB, Nr = 128, L = 25, kϕ = 2 dB, kθ = 2 dB).

5.6. Performance Comparison

Figure 6 displays a performance comparison between the authentication scheme proposed in [16] and our scheme. From Figure 6, we can see that the performance (Pf, Pd) of our scheme jointly using AAoA, EAoA and path gain outperforms that of the scheme only using path gain [16]. This is because the scheme in [16] uses coarse-grained channel information while our scheme uses multi-dimensional mmWave MIMO channel features (i.e., AAoA, EAoA and path gain) to effectively utilize the fine-grained channel information. It is also noted that when Pf increases, the detection rates of both schemes increase. Moreover, the authentication performance (Pf, Pd) of our scheme can better satisfy the practical authentication requirements. This is beneficial for exploiting both the AAoA and EAoA features, and allows us to gain important insights on the impacts of angle domain features on authentication performance.

Figure 6.

Figure 6

Performance comparison between the scheme in [16] and our scheme with the settings of (SNR = 5 dB, Nr = 128, L = 20, kϕ = 2 dB, kθ = 2 dB, kα = 2 dB).

5.7. Impact of ρα on the Authentication Performance

We show in Figure 7 ROC variations under the settings of (SNR = 10 dB, Nr = 128, L = 20, kϕ = 2 dB, kθ = 2 dB, kα = 2 dB) at different correlation coefficients of path gain. From Figure 7, we can see that the authentication performance (Pf, Pd) under ρα = 0.9 outperforms that of the others, and the performance under ρα = 0.7 is the poorest. This is because a larger ρα means that the communication entities move slower. When Pf is fixed, Pd increases when ρα increases. Moreover, the authentication performance (Pf, Pd) under ρα = 0.9 can satisfy the practical authentication requirements.

Figure 7.

Figure 7

ROC curves under different correlation coefficients of path gain with the settings of (SNR = 10 dB, Nr = 128, L = 20, kϕ = 2 dB, kθ = 2 dB, kα = 2 dB).

6. Conclusions

By utilizing multi-dimensional mmWave MIMO channel features, this paper developed a location verification scheme for mmWave MIMO communication systems. Furthermore, we modeled the three-dimensional mmWave channel features (i.e., AAoA, EAoA and path gain) and extracted these feature parameters through maximum-likelihood estimator. We also derived the analytical expressions for the typical performance metrics. Numerical results indicate that the proposed authentication scheme can benefit from using multi-dimensional mmWave channel features. The results in this paper reveal that the proposed scheme is general in nature and can be applied to more communication systems, and we expect the methodology developed in this paper to be valuable for devising new physical layer authentication schemes in other network scenarios.

Author Contributions

Conceptualization, Y.L. and P.Z.; methodology, Y.L.; validation, J.H., Y.L. and P.Z.; investigation, P.Z.; writing—original draft preparation, P.Z.; writing—review and editing, J.H.; funding acquisition, J.H. All authors have read and agreed to the published version of the manuscript.

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

Not applicable.

Conflicts of Interest

The authors declare no conflict of interest.

Funding Statement

This work was supported in part by the Natural Science Foundation of China (NSFC) Grant (62272241), Japan Society for the Promotion of Science (JSPS) Grant (18H03235), and Nanjing University of Posts and Telecommunications Scientific Research Foundation Grant (NY221122).

Footnotes

Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

References

  • 1.Wu F., Xu L., Kumari S., Li X., Shen J., Choo K.R., Wazid M., Das A.K. An efficient authentication and key agreement scheme for multi-gateway wireless sensor networks in IoT deployment. J. Netw. Comput. Appl. 2017;89:72–85. doi: 10.1016/j.jnca.2016.12.008. [DOI] [Google Scholar]
  • 2.Esfahani A., Mantas G., Matischek R., Saghezchi F.B., Rodriguez J., Bicaku A., Maksuti S., Tauber M.G., Schmittner C., Bastos J. A lightweight authentication mmechanism for M2M communications in industrial IoT environment. IEEE Internet Things J. 2019;6:288–296. doi: 10.1109/JIOT.2017.2737630. [DOI] [Google Scholar]
  • 3.Stergiou C., Psannis K.E., Kim B., Gupta B.B. Secure integration of IoT and cloud computing. Future Gener. Comput. Syst. 2018;78:964–975. doi: 10.1016/j.future.2016.11.031. [DOI] [Google Scholar]
  • 4.Wang X., Hao P., Hanzo L. Physical-layer authentication for wireless security enhancement: Current challenges and future developments. IEEE Commun. Mag. 2016;54:152–158. doi: 10.1109/MCOM.2016.7498103. [DOI] [Google Scholar]
  • 5.Xie N., Chen J., Huang L. Physical-layer authentication using multiple channel-based features. IEEE Trans. Inf. Forensics Secur. 2021;16:2356–2366. doi: 10.1109/TIFS.2021.3054534. [DOI] [Google Scholar]
  • 6.Tang J., Xu A., Jiang Y., Zhang Y., Wen H., Zhang T. MmWave MIMO physical layer authentication by using channel sparsity; Proceedings of the 2020 IEEE International Conference on Artificial Intelligence and Information Systems (ICAIIS); Dalian, China. 20–22 March 2020; pp. 221–224. [Google Scholar]
  • 7.Maeng S.J., Yapici Y., Güvenç I., Dai H., Bhuyan A. Power allocation for fingerprint-based PHY-Layer authentication with mmWave UAV networks; Proceedings of the ICC 2021-IEEE International Conference on Communications; Montreal, QC, Canada. 14–23 June 2021; Piscataway, NJ, USA: IEEE; 2021. pp. 1–6. [Google Scholar]
  • 8.Lord S.F. Ph.D. Thesis. Naval Postgraduate School; Monterey, CA, USA: 2019. 5G Millimeter-Wave Physical-Layer Authentication with Planar Reflectors. [Google Scholar]
  • 9.Wang N., Li W., Wang P., Alipour-Fanid A., Jiao L., Zeng K. Physical layer authentication for 5G communications: Opportunities and road ahead. IEEE Netw. 2020;34:198–204. doi: 10.1109/MNET.011.2000122. [DOI] [Google Scholar]
  • 10.Wang N., Wang P., Alipour-Fanid A., Jiao L., Zeng K. Physical-layer security of 5G wireless networks for IoT: Challenges and opportunities. IEEE Internet Things J. 2019;6:8169–8181. doi: 10.1109/JIOT.2019.2927379. [DOI] [Google Scholar]
  • 11.Wang N., Jiao L., Wang P., Dabaghchian M., Zeng K. Efficient identity spoofing attack detection for IoT in mm-Wave and Massive MIMO 5G communication; Proceedings of the IEEE Global Communications Conference, GLOBECOM 2018; Abu Dhabi, United Arab Emirates. 9–13 December 2018; Piscataway, NJ, USA: IEEE; 2018. pp. 1–6. [Google Scholar]
  • 12.Wang N., Jiao L., Alipour-Fanid A., Dabaghchian M., Zeng K. Pilot contamination attack detection for NOMA in 5G mm-Wave massive MIMO networks. IEEE Trans. Inf. Forensics Secur. 2020;15:1363–1378. doi: 10.1109/TIFS.2019.2939742. [DOI] [Google Scholar]
  • 13.Wang N., Li W., Alipour-Fanid A., Jiao L., Dabaghchian M., Zeng K. Pilot contamination attack detection for 5G mmWave grant-Free IoT networks. IEEE Trans. Inf. Forensics Secur. 2021;16:658–670. doi: 10.1109/TIFS.2020.3017932. [DOI] [Google Scholar]
  • 14.Wang N., Jiao L., Wang P., Li W., Zeng K. Exploiting beam features for sspoofing attack detection in mmWave 60-GHz IEEE 802.11ad networks. IEEE Trans. Wirel. Commun. 2021;20:3321–3335. doi: 10.1109/TWC.2021.3049160. [DOI] [Google Scholar]
  • 15.Wang N., Jiao L., Wang P., Li W., Zeng K. Machine learning-based spoofing attack detection in MmWave 60GHz IEEE 802.11ad Networks; Proceedings of the 39th IEEE Conference on Computer Communications, INFOCOM 2020; Toronto, ON, Canada. 6–9 July 2020; Piscataway, NJ, USA: IEEE; 2020. pp. 2579–2588. [Google Scholar]
  • 16.Xiao L., Greenstein L.J., Mandayam N.B., Trappe W. Channel-based spoofing detection in frequency-selective Rayleigh channels. IEEE Trans. Wirel. Commun. 2009;8:5948–5956. doi: 10.1109/TWC.2009.12.081544. [DOI] [Google Scholar]
  • 17.Xiao L., Wan X., Han Z. PHY-Layer authentication with multiple landmarks with reduced overhead. IEEE Trans. Wirel. Commun. 2018;17:1676–1687. doi: 10.1109/TWC.2017.2784431. [DOI] [Google Scholar]
  • 18.Liu F.J., Wang X. Physical layer authentication enhancement using two-dimensional channel quantization. IEEE Trans. Wirel. Commun. 2016;15:4171–4182. doi: 10.1109/TWC.2016.2535442. [DOI] [Google Scholar]
  • 19.Alkhateeb A., Ayach O.E., Leus G., Jr., Heath R.W. Channel estimation and hybrid precoding for millimeter Wave cellular systems. IEEE J. Sel. Top. Signal Process. 2014;8:831–846. doi: 10.1109/JSTSP.2014.2334278. [DOI] [Google Scholar]
  • 20.Méndez-Rial R., Rusu C., Alkhateeb A., González Prelcic N., Heath R.W., Jr. Channel estimation and hybrid combining for mmWave: Phase shifters or switches?; Proceedings of the 2015 Information Theory and Applications Workshop, ITA 2015; San Diego, CA, USA. 1–6 February 2015; Piscataway, NJ, USA: IEEE; 2015. pp. 90–97. [Google Scholar]
  • 21.Singh J., Ramakrishna S. On the feasibility of codebook-based beamforming in millimeter wave systems with multiple antenna arrays. IEEE Trans. Wirel. Commun. 2015;14:2670–2683. doi: 10.1109/TWC.2015.2390637. [DOI] [Google Scholar]
  • 22.Hemadeh I.A., Satyanarayana K., El-Hajjar M., Hanzo L. Millimeter-wave communications: Physical channel models, design considerations, antenna constructions, and link-budget. IEEE Commun. Surv. Tutor. 2018;20:870–913. doi: 10.1109/COMST.2017.2783541. [DOI] [Google Scholar]
  • 23.Fan D., Gao F., Liu Y., Deng Y., Wang G., Zhong Z., Nallanathan A. Angle domain channel estimation in hybrid millimeter wave massive MIMO systems. IEEE Trans. Wirel. Commun. 2018;17:8165–8179. doi: 10.1109/TWC.2018.2874640. [DOI] [Google Scholar]
  • 24.Buzzi S., D’Andrea C. On clustered statistical MIMO millimeter wave channel simulation. arXiv. 20161604.00648 [Google Scholar]
  • 25.Ayach O.E., Rajagopal S., Abu-Surra S., Pi Z., Heath R.W., Jr. Spatially sparse precoding in millimeter wave MIMO systems. IEEE Trans. Wirel. Commun. 2014;13:1499–1513. doi: 10.1109/TWC.2014.011714.130846. [DOI] [Google Scholar]
  • 26.Shen W., Dai L., Shim B., Wang Z., Heath R.W., Jr. Channel feedback based on AoD-adaptive subspace codebook in FDD massive MIMO systems. IEEE Trans. Commun. 2018;66:5235–5248. doi: 10.1109/TCOMM.2018.2849755. [DOI] [Google Scholar]
  • 27.Xie N., Zhang S. Blind authentication at the physical layer under time-varying fading channels. IEEE J. Sel. Areas Commun. 2018;36:1465–1479. doi: 10.1109/JSAC.2018.2824583. [DOI] [Google Scholar]
  • 28.Médard M. The effect upon channel capacity in wireless communications of perfect and imperfect knowledge of the channel. IEEE Trans. Inf. Theory. 2000;46:933–946. doi: 10.1109/18.841172. [DOI] [Google Scholar]
  • 29.Kay S., Hall P. Fundamentals of statistical signal processing, Volume II: Detection theory. Technometrics. 1993;37:465–466. [Google Scholar]
  • 30.Zaidi A., Vandendorpe L. Coding schemes for relay-assisted information embedding. IEEE Trans. Inf. Forensics Secur. 2009;4:70–85. doi: 10.1109/TIFS.2008.2009588. [DOI] [Google Scholar]
  • 31.Tse D., Viswanath P. Fundamentals of Wireless Communication. Cambridge University Press; Cambridge, UK: 2005. [Google Scholar]
  • 32.Goldsmith A. Wireless Communications. Cambridge University Press; Cambridge, UK: 2005. [Google Scholar]

Associated Data

This section collects any data citations, data availability statements, or supplementary materials included in this article.

Data Availability Statement

Not applicable.


Articles from Sensors (Basel, Switzerland) are provided here courtesy of Multidisciplinary Digital Publishing Institute (MDPI)

RESOURCES