Skip to main content

ORIGINAL RESEARCH article

Front. Comms. Net., 03 May 2024
Sec. Security, Privacy and Authentication
This article is part of the Research Topic Physical Layer Security, Authentication, Identification, and Monitoring View all articles

Secure authentication in MIMO systems: exploring physical limits

  • Department of Electrical and Computer Engineering, University of Victoria, Victoria, BC, Canada

Multiple-input multiple-output (MIMO) technology is employed to improve the reliability and capacity of wireless communication systems. However, the wireless communication environment creates vulnerabilities to spoofing attacks. Furthermore, the authentication challenges posed by the heterogeneous characteristics of wireless applications increase as diverse technologies facilitate the growing number of Internet of Things (IoT) devices. To address these challenges, adaptive physical-layer authentication (PLA) leveraging the inherent antenna diversity in MIMO systems is examined, and an information-theoretic perspective on PLA in MIMO systems is given. The real and imaginary components of the received reference signals are used as attributes with a single-class classification support vector machine (SCC-SVM). It is shown that the authentication performance improves with the number of antennas, and the proposed scheme provides robust authentication.

1 Introduction

The number of wireless devices has increased significantly as a result of Internet of Things (IoT) development. However, the limited bandwidth for applications and limited device capabilities make it challenging to deliver reliable services in wireless networks. Multiple-input multiple-output (MIMO) technology can improve the effectiveness and capacity of wireless communication networks without increasing bandwidth resources (Zhang et al., 2020).

Information-theoretic security metrics for secrecy, privacy, authentication, stealth, and covertness have been developed and fundamental limits derived (Liang et al., 2008; Bloch et al., 2021). Shannon (1949) presented the first information-theoretic study of a cryptography model. Cryptography is the science of securing communications. It involves the transformation of plaintext into ciphertext, which can be intercepted by an attacker. A key K is a secret parameter used in conjunction with an algorithm to encrypt or decrypt data. The message M represents the data that need to be protected. For encryption, K is used to transform M into a ciphertext E. The goal is to maximize the secret information rate between legitimate users. Wyner (1975) presented information-theoretic security limits for a discrete memoryless wiretap channel. It was shown that security is possible if the capacity Cm between legitimate users is higher than the wiretap channel capacity Cw between the transmitter and attacker. Abdi et al. (2001) extended the model proposed by Wyner (1975) to a Gaussian wiretap channel. It was shown that secure communication can be achieved if Cs = CmCw > 0. However, Cs is degraded by wireless channels due to factors such as fading (Zou et al., 2016).

The model proposed by Wyner (1975) was extended to MIMO systems (Khisti and Wornell, 2010a), and this was improved by Khisti and Wornell (2010b). It was shown that increasing the number of antennas can improve Cs. Bloch et al. (2008) considered quasi-static fading. The outage probability Pout was shown to depend on the user location and path loss, where Pout = P(Cs < Rs) and Rs is the secrecy rate. Information-theoretic security for MIMO systems was considered by Oggier and Hassibi (2011), but the channel state information (CSI) was assumed to be known. Security without knowledge about the attacker CSI was considered by He et al. (2011).

A MIMO scheme for practical physical-layer security was presented by Ishikawa et al. (2021). It employs chaos-based unitary matrices to eliminate the need for channel estimation. Unlike conventional approaches, an imperfect key agreement in high-mobility scenarios was considered, and an algorithm for reconciling chaotic sequences between legitimate parties was given. Simulation results were presented which show that the performance is superior to that with conventional chaos-based MIMO schemes assuming perfect CSI.

Downlink security in cell-free massive MIMO systems with imperfect channel estimation was investigated by Tubail et al. (2023). Two power allocation algorithms using artificial noise were introduced to combat passive eavesdropping. Imperfect channel estimation was considered as it leads to artificial noise leakage which impacts performance. The results show that the proposed algorithm improves the security through robust authentication.

In this paper, physical-layer authentication (PLA) for MIMO systems is examined from an information-theoretic perspective. The authentication boundary is determined using machine learning (ML). For training, a single-class classification support vector machine (SCC-SVM) is used with only legitimate user data. The real and imaginary components of the received reference signals are employed as attributes. These attributes vary slowly over time as a result of factors such as mobility (Hou et al., 2014; Ferrante et al., 2015; Wang et al., 2015; Wang et al., 2016; Fang et al., 2020). As a result, the SCC-SVM authentication boundary is updated to ensure reliable authentication. The authentication rate (AR) is shown to improve with antenna diversity. The contributions of this paper are as follows.

• PLA for MIMO systems is examined from an information-theoretic perspective.

• The real and imaginary components of the received signals are used as attributes to improve PLA performance.

• A practical approach is presented to extract attributes from cellular network reference signals.

• The effectiveness of the proposed PLA scheme is evaluated and validated in urban environments.

The remainder of this paper is organized as follows: the system model is presented in Section 2; Section 3 introduces SCC-SVM and the proposed PLA scheme; the performance evaluation metrics are given in Section 4; Section 5 provides the simulation results; and Section 6 provides some concluding remarks.

2 System model

The system model for the proposed authentication scheme is shown in Figure 1. In this scheme, Alice (A) represents a user requiring authentication from Bob (B), while the spoofer (S) is an attacker attempting to impersonate A. B must ascertain the legitimacy of A and also reject S. Consequently, B must decide between the two hypotheses

H0:A is transmittingH1:S is transmitting.

Thus, H0 indicates that the signal originates from A, while H1 indicates that it is from S. Both A and S are assumed to be mobile, while B is stationary. A and S have either one or M transmit antennas, and B has N receive antennas.

Figure 1
www.frontiersin.org

Figure 1. System model.

Reference signals are transmitted in cellular networks to facilitate CSI estimation. In particular, sounding reference signals are repeated every 28 symbols or 56 symbols (GPP, version 15.2.0, 2018). The received signal at B can be expressed as

Y=Hx+W,

where x is the transmitted reference signals, H is the channel matrix, and W is independent additive white Gaussian noise (AWGN). The channel matrix for the M × N MIMO system can be partitioned according to the transmit and receive antennas as follows:

H=h11h12h1Mh21h22h2MhN1hN2hNM,

where hnm represents the channel from the mth transmit antenna to the nth receive antenna. H can be estimated from Y corresponding to the known reference signals (Schindler and Mellein, 2011; Germain et al., 2020). Y is used to obtain the data for SCC-SVM training and testing.

The proposed scheme is implemented in the uplink and has an initial phase (T1), followed by subsequent phases (T2, T3, … , Tn). During the initial phase, upper-layer authentication (ULA) is conducted, and SCC-SVM training is performed at B using the received reference signals from A. The real and imaginary components of these signals for each transmit–receive antenna pair are obtained to provide 2 × M attributes per antenna for a total of 2 × M × N attributes. In subsequent phases, SCC-SVM testing is conducted at B to validate the legitimacy of the received signals, which may originate from either A or a spoofer S. Hence, the received signals during these phases are treated as being from an unknown user U. If successful, the attributes are updated, and SCC-SVM training is repeated. Conversely, if testing fails, the connection is terminated.

SCC-SVM training is used in the initial phase to establish an authentication boundary. In subsequent phases, SCC-SVM testing is used to determine whether the received signal attributes fall within this boundary. In this case, the test is successful, and authentication continues. The received signal is rejected if the attributes fall outside the boundary. The proposed scheme leverages the spatial independence of A and S as the physical-layer attributes for authentication are independent. Furthermore, transmit and receive antenna diversity is exploited to generate a large number of attributes. These attributes vary slowly over time due to factors such as mobility (Hou et al., 2014; Ferrante et al., 2015; Wang et al., 2015; Wang et al., 2016; Fang et al., 2020). Consequently, the SCC-SVM authentication boundary is dynamically updated in each subsequent phase to ensure reliable authentication.

3 The proposed scheme

3.1 Single-class classification support vector machine

SCC is a machine learning technique that can be employed to distinguish between A and S using training data from A. The goal is to find the optimal authentication boundary that surrounds most of the training data from A (Tax and Duin, 2004). In this paper, the SCC-SVM algorithm proposed by Schölkopf et al. (2001) is employed. SCC-SVM computes a decision function f which encompasses the majority of the training data [Senigagliesi et al. (2020); Abdrabou and Gulliver (2022c); Abdrabou and Gulliver, 2022a; Abdrabou and Gulliver, 2023]. First, the following optimization problem is solved (Hoang et al., 2021); (Schölkopf et al., 2001):

minw,s,ρ12w2+1ηi=1siρ,subject towΦgiρsi,si0,(1)

where w is the weight vector, ρ is the distance from the origin to the boundary, Φ is a feature mapping determined based on the kernel employed, gi is the ith feature vector used for SCC-SVM training, si is the corresponding slack variable, is the number of training samples, and η is the percentage of data considered as outliers (Senigagliesi et al., 2020). SCC-SVM maps data to a feature space using kernels and then separates the features using a boundary. The optimization problem in Eq. 1 provides w and ρ which determine the boundary used in the decision function Eq. 3. Using Lagrange multipliers pi, qi ≥ 0 yields (Schölkopf et al., 2001)

Lw,s,p,q,ρ=12w2+1ηi=1siρi=1piwΦgiρ+sii=1qisi.

Setting the derivatives with respect to w, s, and ρ as zero yields (Schölkopf et al. 2001)

w=i=1piΦgi,(2)
pi=1ηqi1η,i=1pi=1.

The decision function used to test a new sample t is expressed as follows (Senigagliesi et al. 2020); (Hoang et al. 2021):

ft=sgnwΦtρ,(3)

and substituting w from Eq. 2 yields

ft=sgnipiΦgiΦtρ.

The kernel expansion is defined as (Schölkopf et al. 2001)

kgi,t=ΦgiΦt,

so the decision function is

ft=sgnipikgi,tρ.(4)

A test sample t is accepted if f(t) > 0, which indicates that it is within the authentication boundary (Senigagliesi et al., 2020).

3.2 Proposed scheme

The proposed scheme employs SCC-SVM with antenna diversity. The received signal at the nth receive antenna from the mth transmit antenna is

ynm=xmhnm+nnm,

where xm is the transmitted reference symbol and hnm and nnm are the corresponding channel coefficients and AWGN, respectively. The WINNER II channel model for non-line-of-sight (NLOS) urban environments (Kyösti et al., 2007) is considered here. The received MIMO signals can be expressed as

Y=y11y12y1My21y22y2MyN1yN2yNM.

This matrix is employed to obtain features for SCC-SVM training and testing. Binary phase-shift keying (BPSK) modulation is assumed, so the transmitted signal is (Chatzidiamantis et al., 2011)

xt=kgtkTscos2πfst+φk,

where g(t) is the pulse shaping function, 0 ≤ tTs, Ts is the symbol time, fs is the carrier frequency, and φk ∈ [0, π] is the phase of the kth symbol. The real (R) and imaginary (I) components are used as attributes so that

Y=RI11RI12RI1MRI21RI22RI2MRIN1RIN2RINM.

Figure 2 illustrates the proposed scheme. In the initial phase T1 following ULA authentication, data are obtained from the legitimate user (A) for SCC-SVM training. In subsequent phases, reference signal data from U are utilized by B for testing and training. If testing is successful in a given phase, the corresponding data are employed to update the attributes for training. A sliding window is used so the oldest data are discarded. Conversely, if testing fails, the connection is terminated.

Figure 2
www.frontiersin.org

Figure 2. Authentication scheme flowchart.

The initial authentication is performed in phase T1 with A through ULA. Then, the reference signal data from A are used to construct the training sample vector di. The ith data sample is then

di=RI11,,RI1M,RI21,,RIN1,,RINM.

SCC-SVM training is performed using the vectors di, where i = 1, 2, … , , to obtain the authentication boundary. In subsequent phases, SCC-SVM is utilized to test new samples t, as shown in Eq. 4, originating from U, where U could be A or S. If testing is successful, U is accepted and the attributes are updated, followed by SCC-SVM training. Otherwise, the connection is terminated.

The training samples from A in the initial phase are

di=RiIi11,,RiIi1M,RiIi21,,RiIiN1,,RiIiNM,i=1,2,,,(5)

and the testing sample from U is

t=RIU11,,RIU1M,RIU21,,RIUN1,,RIUNM,(6)

Figure 3 illustrates the sliding window update process for the attributes. In phase T1, the training data from A consist of matrices Y, where each matrix is represented by a vector as shown in Eq. 5. Subsequently, in phase T2 a new data vector t is tested (following scaling), and if accepted, the data matrix is updated by discarding the first row d1 and adding the new data vector as row + 1. Consequently, if the first e new data vectors are accepted, the training data matrix is

Me=d1+ed2+ed+e,

so vectors are used for training.

Figure 3
www.frontiersin.org

Figure 3. Sliding window for attribute updates.

Each attribute undergoes separate minimum–maximum scaling

mr=m1,rm2,rm,rT,r=1,2,,2MN,

to obtain

gr=g1,rg2,rg,rT,r=1,2,,2MN,

where

gi,r=mi,rmmin,rmmax,rmmin,r,

and mmin,r is the minimum value in mr and mmax,r is the maximum value in mr. The feature matrix for training is then

G=g1g2g3MN,

and the elements of t are scaled using mmin,r and mmax,r from the training data as follows:

tr=brmmin,rmmax,rmmin,r

to form the test vector t. The proposed scheme is summarized in Algorithm 1.

Algorithm 1.Proposed scheme.

 ULA for A.

Obtain the received reference signals from each antenna.

Extract the real (R) and imaginary (I) components from the received reference signals.

Construct the training samples di using Eq. 5.

Train SCC-SVM to establish the authentication boundary.

Test SCC-SVM with the sample t as in Eq. 6.

if (f(t) > 0) then

  Accept the user.

  Update the attributes.

  Retrain SCC-SVM.

else if (f(t) ≤ 0) then

  Terminate the connection.

 end if

3.3 Information-theoretic PLA

The authentication performance can be improved with antenna diversity (Abdrabou and Gulliver, 2022b; 2024). This is indicated by the mutual information between the training and testing attributes from A I(TrA; TeA), which is greater than the mutual information between the training attributes from A and testing attributes from S I(TrA; TeS). The mutual information authentication rate IAR can be defined as

IAR=ITrA;TeAITrA;TeS.

First, a single-input multiple-output system (SIMO) and independent channels based on user location and mobility are considered. The mutual information that characterizes the legitimacy of A at the receiver is a function of the wireless link at two consecutive time instances (training and testing). The mutual information between the transmit antenna and receive antennas is

IiSIMO=ITx;Rx1ITx;Rx2ITx;RxN,iA,S.

Each element of this matrix characterizes the received reference signal at times t − 1 (training) and t (testing), so it can be reformulated as

IiSIMO=I1y1t;y1t1I2y2t;y2t1INyNt;yNt1,

where yi (t − 1) is the training data from A and yi(t) is the testing data from U, so then,

IARSIMO=IASIMOISSIMO.

Now, a MIMO system is considered. The mutual information between the transmit antennas and receive antennas can be expressed as

IiMIMO=ITx1;Rx1,,ITxM;Rx1ITx1;Rx2,,ITxM;Rx2ITx1;Rx3,,ITxM;Rx3ITx1;RxN,,ITxM;RxN,iA,S.

Each element of this matrix characterizes the received reference signal at times t − 1 and t, so

IiMIMO=I11y11t;y11t1,,I1My1Mt;y1Mt1I21y21t;y21t1,,I2My2Mt;y2Mt1I31y31t;y31t1,,I3My3Mt;y3Mt1IN1yN1t;yN1t1,,INMyNMt;yNMt1,

where y*(t − 1) is the training data from A and y*(t) is the testing data from U, and therefore,

IARMIMO=IAMIMOISMIMO.

Since mutual information is greater than or equal to zero [Cover and Thomas, 2006, (2.90)],

Iij0,iA,S,jSIMO,MIMO.

The joint mutual information for independent channels in a SIMO system can be formulated as

ITx1;Rx1Rx2=ITx1;Rx1+ITx1;Rx2,ITx1;Rx1RxN=ITx1;Rx1++ITx1;RxN,

so

ITx1;Rx1ITx1;Rx1Rx2ITx1;Rx1Rx2Rx3ITx1;Rx1RxN1ITx1;Rx1RxN.

For a MIMO system, this is

ITx1Tx2;Rx1Rx1=ITx1;Rx1+ITx2;Rx1+ITx1;Rx2+ITx2;Rx2,ITx1TxM;RxjRxN=ITx1;Rx1++ITxM;Rx1+ITx1;Rx2++ITxM;Rx2ITx1;RxN++ITxM;RxN,

so

ITx1;Rx1RxNITx1Tx2;Rx1RxNITx1Tx2Tx3;Rx1RxNITx1Tx2Tx3TxM1;Rx1RxNITx1Tx2Tx3TxM;Rx1RxN,.

These results show that the authentication performance improves with the number of receive and transmit antennas so that

IARuvIARpq,up,vq,

where u and p are the number of receive antennas and v and q are the number of transmit antennas.

3.4 Channel capacity for PLA

The channel capacity C is defined as the maximum mutual information (Cover and Thomas, 2006),

C=maxPxiIX;Y.

The capacity of a MIMO system depends on several factors such as the signal-to-noise ratio (SNR). It can be obtained using singular value decomposition (SVD) to decompose the channel matrix H and obtain the singular values and unitary matrices for the transmitter and receiver as (Golub and Van Loan, 2013)

H=UΣVH,

where U is the unitary matrix corresponding to the transmitter, Σ is a diagonal matrix containing the singular values, and VH is the conjugate transpose of the unitary matrix corresponding to the receiver. The singular values are

Λ=λ1,λ2,,λn,

and the corresponding channel capacity is (Tse and Viswanath, 2005)

C=i=1nlog21+SNRλi2,

where n is the number of singular values and λi is the ith singular value of the channel matrix.

4 Performance evaluation

The performance is evaluated using the confusion matrix which includes true positive (TP), the acceptance of A, true negative (TN), the rejection of S, false negative (FN), the erroneous rejection of A, and false positive (FP), the erroneous acceptance of S. The evaluation metrics are the missed detection rate (MDR), false alarm rate (FAR), precision or positive predictive value (PPV), false discovery rate (FDR), and authentication rate (AR) (Senigagliesi et al., 2020; Abdrabou and Gulliver, 2022b):

MDR=FPFP+TN,
FAR=FNFN+TP,
PPV=TPTP+FP,
FDR=FPTP+FP,
AR=TP+γ×TNTP+FN+γ×TN+FP,

where γ is used to balance between A and S and is given by

γ=TP+FNTN+FP.

The AR improves with the number of antenna (Abdrabou and Gulliver, 2022b), and the corresponding PPV increases, so

IAPPV,

and the FDR decreases, so

ISFDR,

and therefore,

IARPPVFDR.

5 Simulation results

In this section, the performance of the proposed scheme is evaluated in multipath fading channels via Monte Carlo simulation. BPSK modulation is employed with the WINNER II channel model for NLOS urban environments (Kyösti et al., 2007). The single-user scenario has one Alice and three spoofers, while the multiple-user scenario has three Alice and three spoofers, as shown in Figures 4, 5, respectively. In these scenarios, Bob is stationary, while Alice and spoofers move arbitrarily and independently. SCC-SVM is implemented using the scikit-learn library in Python. For the single-user scenario, γ=13, and for the multiple-user scenario, γ = 1. The simulation parameters are given in Table 1.

Figure 4
www.frontiersin.org

Figure 4. Single-user scenario.

Figure 5
www.frontiersin.org

Figure 5. Multiple-user scenario.

Table 1
www.frontiersin.org

Table 1. Simulation parameters.

Figure 6 presents the MDR, FAR, and AR for the single-user scenario with an SNR of 8 dB, velocity of 0.4 km/h, and 1, 4, and 8 receive antennas. This shows that MDR, FAR, and AR improve with an increase in the number of antennas. For instance, with a single transmit antenna, the MDR decreases from 26.0% with 1 receive antenna to 17.8% with four receive antennas and 2.9% with eight receive antennas. Similarly, with four receive antennas, the MDR decreases from 17.8% with one transmit antenna to 4.0% with two transmit antennas and 1.7% with four transmit antennas. The FAR with a single transmit antenna decreases from 11.9% with one receive antenna to 1.9% with four receive antennas and 0.3% with eight receive antennas. In the case of four receive antennas, the FAR decreases from 1.9% with one transmit antenna to 0.2% with two transmit antennas and only 0.1% with four transmit antennas. The AR increases with an increase in the number of antennas. For example, with four receive antennas, the AR increases from 90.2% with one transmit antenna to 97.9% with two transmit antennas and 99.1% with four transmit antennas. These results illustrate the impact of antenna diversity on performance.

Figure 6
www.frontiersin.org

Figure 6. MDR, FAR, and AR versus the number of receive antennas for the single-user scenario with a signal-to-noise ratio (SNR) of 8 dB, velocity of 0.4 km/h, and 1, 4, and 8 receive antennas.

Figure 7 presents C, PPV, FDR, and PPVFDR versus the number of receive antennas in the single-user scenario with an SNR of 8 dB, velocity of 0.4 km/h, and 1, 4, and 8 receive antennas. This shows that increasing the number of antennas improves C and thus, the information authentication rate IAR. With a single transmit antenna, C increases from 1.15 bps with one receive antenna to 4.75 bps with four receive antennas and 5.95 bps with eight receive antennas. Furthermore, the PPV increases, FDR decreases, and PPVFDR increases with an increase in the number of antennas. For instance, with one transmit antenna, the PPV increases from 77.2% with one receive antenna to 84.6% with four receive antennas and 97.2% with eight receive antennas, while with four receive antennas, the PPV increases from 84.6% with one transmit antenna to 96.2% with two transmit antennas and 98.3% with four transmit antennas. In addition, with four receive antennas, the FDR decreases from 15.4% with one transmit antenna to 3.8% with two transmit antennas and 1.7% with four transmit antennas. The PPVFDR also improves with an increase in the number of antennas as with four receive antennas, it increases from 69.2% with one transmit antenna to 92.3% with two transmit antennas and 96.6% with four transmit antennas. These results further illustrate the impact of antenna diversity on performance.

Figure 7
www.frontiersin.org

Figure 7. C, PPV, FDR, and PPVFDR versus the number of receive antennas for the single-user scenario with an SNR of 8 dB, velocity of 0.4 km/h, and 1, 4, and 8 receive antennas.

Figure 8 presents the MDR, FAR, and AR versus the number of receive antennas with an SNR of 8 dB, velocity of 0.4 km/h, and one transmit antenna for the single- and multiple-user scenarios. This shows that the MDR, FAR, and AR increase with the number of receive antennas in both scenarios. For instance, in the multiple-user scenario, the MDR decreases from 44.9% with one receive antenna to 40.1% with four receive antennas and 31.9% with eight receive antennas. The corresponding FAR decreases from 17.7% with 1 receive antenna to 3.7% with four receive antennas and 2.0% with eight receive antennas, while the AR increases from 68.7% with one receive antenna to 78.1% with four receive antennas and 83.1% with eight receive antennas. These results also indicate that the MDR, FAR, and AR are better in the single-user scenario than in the multiple-user scenario. For instance, with four receive antennas, the MDR for the single- and multiple-user scenarios is 17.8% and 40.1%, respectively, while the corresponding FAR and AR are 1.9% and 3.7%, and 90.2% and 78.1%, respectively.

Figure 8
www.frontiersin.org

Figure 8. MDR, FAR, and AR versus the number of receive antennas with an SNR of 8 dB, velocity of 0.4 km/h, and 1 transmit antenna for the single- and multiple-user scenarios.

Figure 9 presents the MDR, FAR, and AR versus the number of receive antennas with an SNR of 8 dB, velocity of 0.4 km/h, and one transmit antenna for the single-user scenario, and η = 0.2 and 0.8. An increase in η means that a higher percentage of the data is treated as outliers, which decreases the MDR, so the probability of accepting spoofers is reduced. For example, with two receive antennas, the MDR is 26.6% for η = 0.2 and decreases to 10.9% for η = 0.8. However, an increase in η also results in a higher FAR, which increases the likelihood of rejecting Alice. For instance, with one receive antenna, the FAR is 8.7% for η = 0.2 and increases to 22.5% for η = 0.8. These results indicate that an increase in η will increase the AR. For example, with four receive antennas, the AR is 87.3% for η = 0.2 and increases to 92.0% for η = 0.8. Thus, η has a significant impact on the authentication performance and, therefore, should be chosen appropriately.

Figure 9
www.frontiersin.org

Figure 9. MDR, FAR, and AR versus the number of receive antenna with an SNR of 8 dB, velocity of 0.4 km/h, and 1 transmit antenna for the single-user scenario and η = 0.2 and 0.8.

Figure 10 presents the AR versus the velocity with an SNR of 8 dB, 1 transmit antenna, and 4 receive antennas using the real and imaginary components of the received signals as features (proposed scheme) and using only the magnitude, as in Pei et al. (2014). This shows that the AR with the proposed scheme is higher for all velocities. For example, the AR at a velocity of 0.4 km/h using the real and imaginary components of the signals as features is 89.2%, but it is only 56.7% using only the magnitude.

Figure 10
www.frontiersin.org

Figure 10. AR versus velocity with an SNR of 8 dB, 1 transmit antenna, and 4 receive antennas using the real and imaginary components of the received signals as features (proposed scheme) and using only the magnitude, as in Pei et al. (2014).

6 Conclusion

An adaptive PLA scheme was proposed that leverages ML and the antenna diversity in MIMO communication systems. Authentication robustness is achieved via a sliding window to continually update the attributes. Furthermore, an information-theoretic perspective was given for PLA in MIMO systems. The results presented illustrate the relationship between authentication performance and the number of antennas; in particular, the mutual information authentication rate IAR improves with the number of antennas.

Data availability statement

The original contributions presented in the study are included in the article; further inquiries can be directed to the corresponding author.

Author contributions

MA: writing–original draft and writing–review and editing. TAG: writing–original draft and writing–review and editing.

Funding

The author(s) declare that no financial support was received for the research, authorship, and/or publication of this article.

Conflict of interest

The authors declare that the research was conducted in the absence of any commercial or financial relationships that could be construed as a potential conflict of interest.

Publisher’s note

All claims expressed in this article are solely those of the authors and do not necessarily represent those of their affiliated organizations, or those of the publisher, the editors, and the reviewers. Any product that may be evaluated in this article, or claim that may be made by its manufacturer, is not guaranteed or endorsed by the publisher.

References

Abdi, A., Tepedelenlioglu, C., Kaveh, M., and Giannakis, G. (2001). On the estimation of the K parameter for the Rice fading distribution. IEEE Commun. Lett. 5, 92–94. doi:10.1109/4234.913150

CrossRef Full Text | Google Scholar

Abdrabou, M., and Gulliver, A. (2022a). Authentication for satellite communication systems using physical characteristics. IEEE Open J. Veh. Technol. 4, 48–60. doi:10.1109/ojvt.2022.3218609

CrossRef Full Text | Google Scholar

Abdrabou, M., and Gulliver, T. A. (2022b). Adaptive physical layer authentication using machine learning with antenna diversity. IEEE Trans. Commun. 70, 6604–6614. doi:10.1109/tcomm.2022.3196648

CrossRef Full Text | Google Scholar

Abdrabou, M., and Gulliver, T. A. (2022c). Physical layer authentication for satellite communication systems using machine learning. IEEE Open J. Commun. Soc. 3, 2380–2389. doi:10.1109/ojcoms.2022.3225846

CrossRef Full Text | Google Scholar

Abdrabou, M., and Gulliver, T. A. (2023). Adaptive physical layer authentication for IoT in MIMO communication systems using support vector machine. IEEE Internet Things J. 10, 19861–19873. doi:10.1109/jiot.2023.3282214

CrossRef Full Text | Google Scholar

Abdrabou, M., and Gulliver, T. A. (2024). Game theoretic spoofing detection for space information networks using physical attributes. IEEE Trans. Commun., 1. doi:10.1109/tcomm.2024.3370433

CrossRef Full Text | Google Scholar

Bloch, M., Barros, J., Rodrigues, M. R., and McLaughlin, S. W. (2008). Wireless information-theoretic security. IEEE Trans. Inf. Theory 54, 2515–2534. doi:10.1109/tit.2008.921908

CrossRef Full Text | Google Scholar

Bloch, M., Günlü, O., Yener, A., Oggier, F., Poor, H. V., Sankar, L., et al. (2021). An overview of information-theoretic security and privacy: metrics, limits and applications. IEEE J. Sel. Areas Inf. Theory 2, 5–22. doi:10.1109/jsait.2021.3062755

CrossRef Full Text | Google Scholar

Chatzidiamantis, N. D., Karagiannidis, G. K., Kriezis, E. E., and Matthaiou, M. (2011). “Diversity combining in hybrid RF/FSO systems with PSK modulation,” in IEEE international conference on communications (Japan: Kyoto).

CrossRef Full Text | Google Scholar

Cover, T. M., and Thomas, J. A. (2006). Elements of information theory. 2nd Ed. USA: John Wiley & Sons.

Google Scholar

Fang, H., Wang, X., and Xu, L. (2020). Fuzzy learning for multi-dimensional adaptive physical layer authentication: a compact and robust approach. IEEE Trans. Wirel. Commun. 19, 5420–5432. doi:10.1109/twc.2020.2993175

CrossRef Full Text | Google Scholar

Ferrante, A., Laurenti, N., Masiero, C., Pavon, M., and Tomasin, S. (2015). On the error region for channel estimation-based physical layer authentication over Rayleigh fading. IEEE Trans. Inf. Forensics Secur. 10, 941–952. doi:10.1109/tifs.2015.2392565

CrossRef Full Text | Google Scholar

Germain, K. S., and Kragh, F. (2020). “Physical-layer authentication using channel state information and machine learning,” in International Conference on Signal Processing and Communication Systems, Australia, 6 - 8 September 2023 (IEEE).

Google Scholar

Golub, G. H., and Van Loan, C. F. (2013). Matrix computations. China: The John Hopkins University Press.

Google Scholar

GPP version 15.2.0 (2018). NR; Physical channels and modulation. 3rd Gener. Partnersh. Proj. Tech. Specif. 38, 211.

Google Scholar

He, X., Khisti, A., and Yener, A. (2011). “MIMO broadcast channel with arbitrarily varying eavesdropper channel: secrecy degrees of freedom,” in IEEE Global Telecommunications Conference, Houston, TX, USA, 29 November 2004 (IEEE).

Google Scholar

Hoang, T. M., Duong, T. Q., Tuan, H. D., Lambotharan, S., and Hanzo, L. (2021). Physical layer security: detection of active eavesdropping attacks by support vector machines. IEEE Access 9, 31595–31607. doi:10.1109/access.2021.3059648

CrossRef Full Text | Google Scholar

Hou, W., Wang, X., Chouinard, J.-Y., and Refaey, A. (2014). Physical layer authentication for mobile systems with time-varying carrier frequency offsets. IEEE Trans. Commun. 62, 1658–1667. doi:10.1109/tcomm.2014.032914.120921

CrossRef Full Text | Google Scholar

Ishikawa, N., Hamamreh, J. M., Okamoto, E., Xu, C., and Xiao, L. (2021). Artificially time-varying differential MIMO for achieving practical physical layer security. IEEE Open J. Commun. Soc. 2, 2180–2194. doi:10.1109/ojcoms.2021.3112486

CrossRef Full Text | Google Scholar

Khisti, A., and Wornell, G. W. (2010a). Secure transmission with multiple antennas I: the MISOME wiretap channel. IEEE Trans. Inf. Theory 56, 3088–3104. doi:10.1109/tit.2010.2048445

CrossRef Full Text | Google Scholar

Khisti, A., and Wornell, G. W. (2010b). Secure transmission with multiple antennas—part II: the MIMOME wiretap channel. IEEE Trans. Inf. Theory 56, 5515–5532. doi:10.1109/tit.2010.2068852

CrossRef Full Text | Google Scholar

Kyösti, P., Meinilä, J., Jämsä, T., et al. (2007). WINNER II channel models. China: Information Society Technologies. Technical Report IST-4-027756 WINNER II D1.1.2 V1.2.

Google Scholar

Liang, Y., Poor, H. V., and Shamai (Shitz), S. (2008). Information theoretic security. Found. Trends® Commun. Inf. Theory 5, 355–580. doi:10.1561/0100000036

CrossRef Full Text | Google Scholar

Oggier, F., and Hassibi, B. (2011). The secrecy capacity of the MIMO wiretap channel. IEEE Trans. Inf. Theory 57, 4961–4972. doi:10.1109/tit.2011.2158487

CrossRef Full Text | Google Scholar

Pei, C., Zhang, N., Shen, X. S., and Mark, J. W. (2014). “Channel-based physical layer authentication,” in IEEE Global Communications Conference, Austin, TX, USA, 8–12 December 2024 (IEEE), 4114–4119.

CrossRef Full Text | Google Scholar

Schindler, S., and Mellein, H. (2011). Assessing a MIMO channel. Rohde and Schwarz: White Paper.

Google Scholar

Schölkopf, B., Platt, J. C., Shawe-Taylor, J., Smola, A. J., and Williamson, R. C. (2001). Estimating the support of a high-dimensional distribution. Neural Comput. 13, 1443–1471. doi:10.1162/089976601750264965

PubMed Abstract | CrossRef Full Text | Google Scholar

Senigagliesi, L., Baldi, M., and Gambi, E. (2020). Comparison of statistical and machine learning techniques for physical layer authentication. IEEE Trans. Inf. Forensics Secur. 16, 1506–1521. doi:10.1109/tifs.2020.3033454

CrossRef Full Text | Google Scholar

Shannon, C. E. (1949). Communication theory of secrecy systems. Bell Syst. Tech. J. 28, 656–715. doi:10.1002/j.1538-7305.1949.tb00928.x

CrossRef Full Text | Google Scholar

Tax, D. M., and Duin, R. P. (2004). Support vector data description. Mach. Learn. 54, 45–66. doi:10.1023/b:mach.0000008084.60811.49

CrossRef Full Text | Google Scholar

Tse, D., and Viswanath, P. (2005). Fundamentals of wireless communication. Cambridge: Cambridge University Press.

Google Scholar

Tubail, D. A., Alsmadi, M., and Ikki, S. (2023). Physical layer security in downlink of cell-free massive MIMO with imperfect CSI. IEEE Trans. Inf. Forensics Secur. 18, 2945–2960. doi:10.1109/tifs.2023.3272769

CrossRef Full Text | Google Scholar

Wang, W., Chen, Y., and Zhang, Q. (2015). Privacy-preserving location authentication in Wi-Fi networks using fine-grained physical layer signatures. IEEE Trans. Wirel. Commun. 15, 1218–1225. doi:10.1109/twc.2015.2487453

CrossRef Full Text | Google Scholar

Wang, W., Sun, Z., Piao, S., Zhu, B., and Ren, K. (2016). Wireless physical-layer identification: modeling and validation. IEEE Trans. Inf. Forensics Secur. 11, 2091–2106. doi:10.1109/tifs.2016.2552146

CrossRef Full Text | Google Scholar

Wyner, A. D. (1975). The wire-tap channel. Bell Syst. Tech. J. 54, 1355–1387. doi:10.1002/j.1538-7305.1975.tb02040.x

CrossRef Full Text | Google Scholar

Zhang, P., Shen, Y., Jiang, X., and Wu, B. (2020). Physical layer authentication jointly utilizing channel and phase noise in MIMO systems. IEEE Trans. Commun. 68, 2446–2458. doi:10.1109/tcomm.2020.2967393

CrossRef Full Text | Google Scholar

Zou, Y., Zhu, J., Wang, X., and Hanzo, L. (2016). A survey on wireless security: technical challenges, recent advances, and future trends. Proc. IEEE 104, 1727–1765. doi:10.1109/jproc.2016.2558521

CrossRef Full Text | Google Scholar

Keywords: physical-layer authentication, single-class classification, information theory, machine learning, MIMO systems

Citation: Abdrabou M and Gulliver TA (2024) Secure authentication in MIMO systems: exploring physical limits. Front. Comms. Net 5:1370496. doi: 10.3389/frcmn.2024.1370496

Received: 14 January 2024; Accepted: 05 March 2024;
Published: 03 May 2024.

Edited by:

Pantea Nadimi Goki, Sant’Anna School of Advanced Studies, Italy

Reviewed by:

Lei Guan, Xidian University, China
Chanapha Bast, Udon Thani Rajabhat University, Thailand

Copyright © 2024 Abdrabou and Gulliver. This is an open-access article distributed under the terms of the Creative Commons Attribution License (CC BY). The use, distribution or reproduction in other forums is permitted, provided the original author(s) and the copyright owner(s) are credited and that the original publication in this journal is cited, in accordance with accepted academic practice. No use, distribution or reproduction is permitted which does not comply with these terms.

*Correspondence: Mohammed Abdrabou, YWJkcmFib3VAb3V0bG9vay5jb20=

Disclaimer: All claims expressed in this article are solely those of the authors and do not necessarily represent those of their affiliated organizations, or those of the publisher, the editors and the reviewers. Any product that may be evaluated in this article or claim that may be made by its manufacturer is not guaranteed or endorsed by the publisher.