Next Article in Journal
A Sampling-Based Algorithm with the Metropolis Acceptance Criterion for Robot Motion Planning
Previous Article in Journal
Potentiometric Determination of Maprotiline Hydrochloride in Pharmaceutical and Biological Matrices Using a Novel Modified Carbon Paste Electrode
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Utilizing Multi-Dimensional MmWave MIMO Channel Features for Location Verification

1
School of Computer Science, Nanjing University of Posts and Telecommunications, Nanjing 210023, China
2
School of Computer Science, Xidian University, Xi’an 710071, China
*
Author to whom correspondence should be addressed.
Sensors 2022, 22(23), 9202; https://doi.org/10.3390/s22239202
Submission received: 20 October 2022 / Revised: 15 November 2022 / Accepted: 21 November 2022 / Published: 26 November 2022
(This article belongs to the Section Sensor Networks)

Abstract

:
In this paper, we address the problem of authenticating transmitters in millimeter-wave (mmWave) multiple-input multiple-output (MIMO) communication systems, and propose a location verification scheme based on multi-dimensional mmWave MIMO channel features. In particular, we first examine the mmWave MIMO channel features in terms of azimuth angle of arrival (AAoA), elevation angle of arrival (EAoA), and path gain, and then extract these fine-grained channel features through the maximum-likelihood (ML) estimation method. Based on the extracted feature parameters, authentication validation is cast in the framework of hypothesis testing theory. We also derive the analytical expressions for the typical false alarm and detection rates by using the likelihood ratio test and thus the statistical performance is analytically established. Finally, extensive numerical results are provided to demonstrate the performance of the proposed authentication scheme.

1. Introduction

Millimeter-wave (mmWave) multiple-input multiple-output (MIMO) systems serve as a critical technique for 5G (fifth-generation communication) and beyond wireless communication networks. The mmWave MIMO technique can lead to a significant increase in data rates, wide bandwidth, and higher spectrum efficiency. By integrating huge antenna arrays, 5G and beyond communication systems operating from 30 to 300 GHz can support huge connections among a bulk of smart devices, contributing to various applications such as the Industrial Internet of Things (IIoT) and the Internet of Vehicles (IoV).
However, mmWave MIMO communication systems may become subject to malicious attacks because of the above important applications they can support. Moreover, the mmWave wireless communication medium is open in space and thus attackers can easily access the communication network and obtain the transferred information between legitimate users and base stations. One of the main threats in mmWave MIMO systems is identity-based spoofing attack, where an attacker eavesdrops the legitimate communication links and further impersonates a legitimate transmitter to inject harmful signals into the communication network. To tackle the spoofing attacks in mmWave systems, identity authentication presents a promising solution to secure mmWave MIMO communication systems.
We note that the existing authentication schemes can be roughly divided into higher layer and physical layer authentication schemes. The higher layer authentication schemes are mainly dependent on secret keys and encryption/decryption algorithms to validate transmitter identities [1,2,3]. Meanwhile, the physical layer authentication schemes verify transmitter identities through physical layer features [4]. It is noted that the higher layer authentication may not completely adapt to the emerging mmWave MIMO systems which include distributed, dynamic and highly heterogeneous devices. Such mmWave MIMO systems may not support the cryptographic key distribution and management, high consumption of communication and computation resources in higher layer authentication schemes. As a complement and an enhancement of the higher layer authentication, physical layer authentication possesses several characteristics such as high security, low complexity and high compatibility [5]. Thus, in this paper we focus on physical layer authentication in mmWave MIMO systems.
Existing physical layer authentication schemes mainly include channel-based authentication and hardware-impairment-based authentication. The hardware-impairment-based method authenticates the legitimacy of a transmitter identity by extracting specific non-ideal hardware parameters from received signals. In contrast, channel-based authentication utilizes the fact that wireless channels decorrelate rapidly as the source (e.g., a transmitter or user using transmitter is transmitting signals to an intended destination/receiver) changes location in an environment with rich scatterers and reflectors. In fact, channel-based authentication verifies the location of the current transmitter rather than transmitter physics identity, and hence is referred to as location verification. There exists some research works on physical layer authentication for mmWave systems [6,7,8,9,10,11,12,13,14,15]. In [6], the authors propose a physical layer authentication scheme by using sparse mmWave channel. A power allocation technique for the precoder and the authentication tag is first developed for fingerprint-based authentication in a multi-user mmWave UAV network [7]. Multipath time delay caused by planar specular reflectors is acquired to illustrate the authenticity of user position 5G mmWave communication with planar reflectors [8]. The intrinsic physical attributes for 5G communications are analyzed for physical layer authentication in detail and the future possible directions for the exploitation of physical attributes is demonstrated in [9]. The authors in [10] further study the physical characteristics of 5G IoT in various application scenarios and describe the possible security threats resulting from the 5G IoT physical layer. Based on virtual angles of arrival in mmWave systems and machine learning methods, the authors in [11] propose a physical layer authentication scheme to detection spoofing attacks. Two effective pilot contamination attack detection approaches are proposed for power non-orthogonal multiple access in massive MIMO 5G communications, based on the sparseness and statistics of mmWave virtual channels [12]. Following this line, the authors in [13] present a new physical layer countermeasure using channel virtual representation to defend against pilot contamination attack. In [14], unique beam pattern features are utilized to achieve physical layer spoofing attack detection and the detection problem is cast as a machine learning classification through the sector level sweep (SLS) process. The authors in [15] develop a physical layer authentication scheme by using signal-to-noise ratio (SNR) trace features to detect spoofing attacks in mmWave systems.
Frequency-selective Rayleigh channel time variations are used to detect spoofing attacks in wireless networks, considering the channel estimation errors [16]. To improve the spoofing detection accuracy, a logistic regression-based authentication approach is developed without the requirements of the known channel model [17]. The authors jointly use multipath delay and channel gain characteristics of the channel impulse response to achieve performance improvement of physical layer authentication [18]. The above existing approaches demonstrate the uniqueness and usability of physical layer features for spoofing attack detection and authentication. It is noted that the above existing approaches are developed for spoofing detection by conventional channel state information. These approaches cannot be extended directly to mmWave MIMO communication systems because it is difficult for them to sufficiently excavate fine-grained physical layer characteristics from mmWave MIMO channels. Hardware-impairment-based authentication generally needs to employ high-precision hardware equipment for hardware feature extraction and bears high computational complexity [14,15]. Moreover, machine-learning-based authentication framework requires an expensive training stage with a large amount of training data, which might be unrealistic in practice. In addition, the analytic establishment of statistical performances still remains an open problem in machine-learning-based authentication frameworks. To this end, we explore the exploitation of multi-dimensional mmWave MIMO channel features to design a new location verification scheme for mmWave MIMO communication systems. These channel features include azimuth angle of arrival (AAoA), elevation angle of arrival (EAoA) and path gain, which are jointly used to validate the legitimacy of transmitters and to improve the authentication performance. The main difference between the schemes proposed in this paper and those in previous works [16,17,18] is that the previous approaches mainly focus on channel statistics in the time domain while this paper extracts channel features in the time domain as well as the angle domain. In addition, the scheme proposed in this paper attempts to explore the exploitation of multi-dimensional mmWave MIMO channel features to achieve location verification.
The main contributions of this paper are summarized as follows:
  • By exploiting multi-dimensional mmWave MIMO channel features in both the time domain and angle domain, we develop a new location verification scheme to achieve validation of a transmitter location for mmWave MIMO communication systems.
  • To determine estimation error variances of channel features in terms of AAoA, EAoA, and path gain, we estimate the mmWave MIMO channels based on maximum-likelihood estimation theory. To analytically evaluate the performance of our proposed location verification scheme, we derive the typical two performance metrics and the statistical performance is analytically established.
  • Extensive numerical results are provided to demonstrate that the proposed scheme achieves desired performance. Numerical results are used to further show how the system parameters can affect the statistical performance.
The remainder of this paper is organized as follows. Section 2 introduces the concerned system model and problem formulation. Section 3 and Section 4 present the proposed location verification scheme and performance analysis, respectively. Section 5 shows the numerical results and performance evaluation. Finally, Section 6 concludes this paper.
Notation: ( · ) H , ( · ) T , ( · ) , ( · ) 1 , ( · ) denote the conjugate-transpose, transpose, conjugate, inverse and pseudo-inverse of a matrix, respectively. The ( m , n ) -th element of a matrix H is H m , n . diag ( a 1 , . . . , a N ) is a diagonal matrix with a 1 , . . . , a N on the main diagonal. vec ( H ) is the vectorization of matrix H . tr ( · ) and ≜ represent the matrix trace function and definitions, respectively. E { · } represents the expectation operator. | | · | | 2 is the Euclidean norm operator. A Gaussian random variable x with mean μ and variance c can be represented by x N ( μ , c ) . If let X be the subspace spanned by the columns of matrix X , then P X denotes the orthogonal projection matrix onto X , that is, P X = X ( X H X ) 1 X H .

2. Problem Formulation and System Model

2.1. Problem Formulation

Similar to previous works [16,17,18], we also use a three-entity model including a legitimate transmitter (Alice), a malicious attacker (Eve) and a legitimate base station (Bob), where Alice and Eve are both equipped with a single antenna and Bob is equipped with N r antennas, as shown in Figure 1. Eve intends to spoof Bob by using the identity of Alice and thus may launch some more advanced attacks, such as a man-in-the-middle attack and session hijacking attack while Alice communicates with Bob.
Suppose Alice transmits one data frame to Bob at time t 1 and this data frame was validated by cryptography-based higher layer authentication approaches. In this process, Bob measures and stores physical layer features information, e.g., mmWave MIMO channel features, with the help of signal estimation techniques. Subsequently, at time t, an unknown transmitter (either Alice or Eve) sends another data frame to Bob and Bob needs to validate the data frame origin (i.e., the current transmitter identity) to avoid impersonation attack.
Eve has data frame structure information by probing the transmitted signals between Alice and Bob and some publicly known information (e.g., training sequences and pilot signals). The estimation techniques and authentication schemes that Bob utilizes cannot be known by the attacker, Eve. Further, we exploit the carrier sense multiple access/collision detection protocol.

2.2. Channel Model

Bob has a N r -antenna uniform planar array (UPA) where the numbers of antennas in the horizon and vertical directions are M and N, respectively, where N r = M N . The number of radio frequency chains of Bob is M R F [19]. Let d be the distance between any arbitrary two adjacent antennas, and G R F be the analog beamformer equipped at Bob. Considering the limited scattering characteristics of the mmWave communication environments, we here adopt the extended Saleh-Valenzuela (SV) model to characterize the mmWave MIMO channels [20,21]. Denote ϕ l as the azimuth angle of arrival (AAoA) of the l-th propagation multipath of the transmitter and θ l as the elevation angle of arrival (EAoA) of that, for l = 1 , 2 , , L , respectively. We assume ϕ l N ( 0 , σ ϕ l , X B 2 ) and θ l N ( 0 , σ θ l , X B 2 ) . The steering matrix A ( ϕ l , θ l ) is expressed by
A ( ϕ l , θ l ) = 1 M N 1 e j 2 π d / λ ( N 1 ) sin ϕ l cos θ l e j 2 π d / λ ( M 1 ) cos ϕ l e j 2 π d / λ ( ( M 1 ) cos ϕ l + ( N 1 ) sin ϕ l cos θ l ) ,
where λ is the wavelength of the carrier signal [22]. For simplicity, let v 1 , l = 2 π d λ cos ϕ l and v 2 , l = 2 π d λ sin ϕ l cos θ l . The steering matrix A ( ϕ l , θ l ) can be further written as
A ( ϕ l , θ l ) = A ( v 1 , l , v 2 , l ) = a ( v 1 , l ) a T ( v 2 , l ) ,
where a ( v 1 , l ) = 1 M [ 1 , , e j ( M 1 ) v 1 , l ] T and a ( v 2 , l ) = 1 N [ 1 , , e j ( N 1 ) v 2 , l ] T .
Similar to [23], the mmWave channel with L being the number of propagation paths is modeled as
H = 1 L l = 1 L α l A ( ϕ l , θ l ) = 1 L l = 1 L α l a ( v 1 , l ) a T ( v 2 , l ) = 1 L A v 1 H α A v 2 T ,
where A v 1 = [ a ( v 1 , 1 ) , a ( v v 1 , 2 ) , , a ( v 1 , L ) ] , A v 2 = [ a ( v 2 , 1 ) , a ( v v 2 , 2 ) , , a ( v 2 , L ) ] , H α = diag ( α 1 , α 2 , , α L ) and α l CN ( 0 , σ α l , X B 2 ) is the path gain of the l-th propagation path [22,24,25].
The ( m , n ) -th element ( m = 0 , 1 , , M 1 and n = 0 , 1 , , N 1 ) for matrix H is
H m , n = 1 L M N l = 1 L α l e j ( m v 1 , l + n v 2 , l ) .
Path gain is assumed to keep unchanged during one frame [26]. Based on [27], we use first-oder Gauss–Markov process to model the time-varying path gain as
α l ( t ) = ρ α α l ( t 1 ) + 1 ρ α 2 u α l ( t ) ,
where ρ α is the path gain correlation coefficient [28] and u α l ( t ) is zero-mean Gaussian noise, i.e., u α l ( t ) CN ( 0 , σ α l , X B 2 ) .
Similarly, we use first-order Gauss–Markov process to model the time-varying azimuth angle of arrival as
ϕ l ( t ) = ρ ϕ ϕ l ( t 1 ) + 1 ρ ϕ 2 u ϕ l ( t ) ,
where ρ ϕ is the AAoA correlation coefficient [28] and u ϕ l ( t ) is zero-mean Gaussian noise, i.e., u ϕ l ( t ) N ( 0 , σ ϕ l , X B 2 ) . We also use first-order Gauss–Markov process to model the time-varying elevation angle of arrival as
θ l ( t ) = ρ θ θ l ( t 1 ) + 1 ρ θ 2 u θ l ( t ) ,
where ρ θ is the EAoA correlation coefficient [28] and u θ l ( t ) is zero-mean Gaussian noise, i.e., u θ l ( t ) N ( 0 , σ θ l , X B 2 ) .
Channel-based verification utilizes the fact that wireless channels decorrelate rapidly as the source (e.g., a transmitter or user using transmitter is transmitting signals to an intended destination/receiver) changes location in an environment with rich scatterers and reflectors. This indicates that wireless channel features are spatially decorrelated between different geographic locations. When the distance between a legitimate source and an adversary is greater than half of the wavelength, it is extremely difficult for the adversary to obtain the accurate wireless channel features. Although the channel-based method essentially authenticates the practical geographic location related to the inherent properties of channel features, it is an effective authentication to achieve legitimacy validation of the source identity. Therefore, this paper aims to design a new location verification scheme for validating data frame origin to resist against the impersonation attack.

2.3. Communication Model

The baseband signal received by Bob at time t is written as
r ( t ) = G R F H vec ( H X B ( t ) ) s ( t ) + n ( t ) ,
where
  • s ( t ) is the transmitted signal at time t. The signal power is p = E { | s ( t ) | 2 } .
  • H X B ( t ) denotes the channel matrix between transmitter X (either Alice or Eve) and receiver Bob.
  • n ( t ) is a zero-mean complex additive white Gaussian noise (AWGN), i.e., n ( t ) CN ( 0 , σ n 2 I ) .

3. Proposed Location Verification Scheme

3.1. Estimation of MmWave Channels

To exploit the fine-grained mmWave channel features, we estimate the channel parameters separately. We first estimate AAoA and EAoA, and then estimate the mmWave path gain. We can write the estimations of ϕ l , X B ( t ) , θ l , X B ( t ) and α l , X B ( t ) , respectively, as
ϕ ^ l , X B ( t ) = ϕ l , X B ( t ) + Δ ϕ l ( t ) ,
θ ^ l , X B ( t ) = θ l , X B ( t ) + Δ θ l ( t ) ,
α ^ l , X B ( t ) = α l , X B ( t ) + Δ α l ( t ) ,
where Δ ϕ N ( 0 , σ Δ ϕ 2 ) , Δ θ N ( 0 , σ Δ θ 2 ) and Δ α CN ( 0 , σ Δ α 2 ) are the corresponding estimation errors, respectively. Next, we calculate the variances of the estimation errors, i.e., σ Δ ϕ 2 , σ Δ θ 2 and σ Δ α 2 .
For notational simplicity, here we ignore the time index t and the path index l. The signal received by Bob at time t is given by
r = G R F H vec ( H ) s + n = G R F H vec ( A ) α s + n ,
where A is the M × N steering matrix with its ( m , n ) -th element given by
A m , n = 1 M N e j ( m v 1 + n v 2 ) .
The conditional PDF of r is expressed by
f ( r | v 1 , v 2 , α ) = 1 ( π σ n 2 ) M R F exp | | r G R F H vec ( A ) α s | | 2 σ n 2 .
The maximum-likelihood (ML) method in [29] is used to estimate mmWave channel features v 1 , v 2 , and α . The estimation of these features can be expressed as
[ v 1 ^ , v 2 ^ , α ^ ] = arg max v 1 , v 2 , α f ( r | v 1 , v 2 , α ) .
Based on (14) and (15), we can equivalently write (15) as
[ v 1 ^ , v 2 ^ , α ^ ] = arg min v 1 , v 2 , α | | r G R F H vec ( A ) α s | | 2 .
When giving v 1 and v 2 , the estimation of α is calculated as
α ^ = vec ( A ) H ( G R F H ) s r .
Substituting (17) into (16), the estimations of v 1 and v 2 is written as
[ v 1 ^ , v 2 ^ ] = arg min v 1 , v 2 | | r G R F H vec ( A ) vec ( A ) H ( G R F H ) s r s | | 2 arg max v 1 , v 2 r H G R F H P b ( G R F H ) r = arg max v 1 , v 2 g ( v 1 , v 2 ) ,
where g ( v 1 , v 2 ) is the cost function related to v 1 and v 2 , σ s 2 = s s is the signal power and P b = vec ( A ) vec ( A ) H .
Next, we give Lemma 1 regarding the variance of the estimations for v 1 and v 2 .
Lemma 1. 
The variance of the estimations for v 1 and v 2 in (18) are given by
c Δ v k = σ n 2 2 σ s 2 | α | 2 vec ( A ) H V k P b V k vec ( A ) , k = 1 , 2 ,
where P b = I P b . V 1 and V 2 are the diagonal matrices given by
V 1 = diag ( 0 . , 0 N , , ( M 1 ) , , ( M 1 ) N ) ,
V 2 = diag ( 0 . , 0 M , , ( N 1 ) , , ( N 1 ) M ) .
Proof. 
The received signal without noise can be written as
r s = G R F H vec ( A ) α s .
When considering the receiver noise, the received signal can be further written as r = r s + n . By using Taylor series expansion, the first derivative of the cost function g ( v 1 , v 2 ) is given by
g ( v 1 , v 2 ) v k | v e = v ^ k g ( v 1 , v 2 ) v k | v e = v ^ k + 2 g ( v 1 , v 2 ) 2 v k | v e = v ^ k Δ v k ,
where Δ v k = v ^ k v k denotes perturbation on v k .
Setting (23) equal to zero, Δ v k is given by
Δ v k = g ( v 1 , v 2 ) v k | v e = v ^ k 2 g ( v 1 , v 2 ) 2 v k | v e = v ^ k = g ˙ ( v 1 , v 2 | v k ) g ¨ ( v 1 , v 2 | v k ) ,
where g ˙ ( v 1 , v 2 | v k ) and g ¨ ( v 1 , v 2 | v k ) are the first- and second-order derivatives of the cost function g ( v 1 , v 2 ) conditioned on v k , respectively.
g ˙ ( v 1 , v 2 | v k ) is expressed as
g ˙ ( v 1 , v 2 | v k ) = j r H G R F H V k P b ( G R F H ) r j r H G R F H P b V k ( G R F H ) r .
By substituting (22) into (25), g ˙ ( v 1 , v 2 | v k ) in (25) becomes
g ˙ ( v 1 , v 2 | v k ) = j ( r s + n ) H G R F H V k P b ( G R F H ) ( r s + n ) j ( r s + n ) H G R F H P b W e ( G R F H ) ( r s + n ) = 2 { r s H G R F H V k P b ( G R F H ) n } 2 { n H G R F H V k P b ( G R F H ) n } .
Due to the independence between n and r s , we have
E { g ˙ ( v 1 , v 2 | v k ) } = 2 σ n 2 { tr { G R F H V k P b ( G R F H ) } } = 0 .
The second-order conditional derivative g ¨ ( v 1 , v 2 | v k ) with respect to v k is written as
g ¨ ( v 1 , v 2 | v k ) = r H G R F H V k 2 P b ( G R F H ) n + r H G R F H V k P b V k ( G R F H ) r + r H G R F H V k P b V k ( G R F H ) r n H G R F H P b V k 2 ( G R F H ) r .
Similarly, E { g ¨ ( v 1 , v 2 | v k ) } is calculated as
E { g ¨ ( v 1 , v 2 | v k ) } = 2 r s H G R F H V k P b V k ( G R F H ) r s + E { tr ( V k 2 P b + 2 V k P b V k P b V k 2 ) } = 2 σ s 2 | α | 2 vec ( A ) H V k P b V k vec ( A ) .
Based on (28) and (29), g ¨ ( v 1 , v 2 | v k ) is further written as
g ¨ ( v 1 , v 2 | v k ) = E { g ¨ ( v 1 , v 2 | v k ) } + f 2 ( n ) + f 2 ( n 2 ) ,
where f 2 ( n ) and f 2 ( n 2 ) represent the linear and quadrature functions of n in g ¨ ( v 1 , v 2 | v k ) , respectively. g ˙ ( v 1 , v 2 | v k ) can be written as
g ˙ ( v 1 , v 2 | v k ) = f 1 ( n ) + f 1 ( n 2 ) ,
where f 1 ( n ) and f 1 ( n 2 ) are the linear and quadrature functions of n in g ˙ ( v 1 , v 2 | v k ) , respectively.
Substituting (30) and (31) into (24), Δ v k in (24) can be rewritten as
Δ v k = f 1 ( n ) + f 1 ( n 2 ) E { g ¨ ( v 1 , v 2 | v k ) } + f 2 ( n ) + f 2 ( n 2 ) = f 1 ( n ) + f 1 ( n 2 ) E { g ¨ ( v 1 , v 2 | v k ) } 1 f 2 ( n ) + f 2 ( n 2 ) E { g ¨ ( v 1 , v 2 | v k ) } + f 2 ( n ) + f 2 ( n 2 ) E { g ¨ ( v 1 , v 2 | v k ) } 2 f 1 ( n ) + f 1 ( n 2 ) E { g ¨ ( v 1 , v 2 | v k ) } = g ˙ ( v 1 , v 2 | v k ) E { g ¨ ( v 1 , v 2 | v k ) } .
c Δ v k is expressed by
c Δ v k = E { g ˙ ( v 1 , v 2 | v k ) 2 } E { g ¨ ( v 1 , v 2 | v k ) } 2 ,
where
E { g ˙ ( v 1 , v 2 | v k ) 2 } 2 σ n 2 r s H G R F H V k P b V k ( G R F H ) r s = 2 σ s 2 σ n 2 | α | 2 vec ( A ) H V k P b V k vec ( A ) .
Substituting (27), (29) and (34) into (33) yields (19). □
Using the formulations of v 1 and v 2 in Section 2.2, ϕ and θ are written, respectively, as
ϕ = cos 1 λ v 1 2 π d ,
θ = cos 1 λ v 2 2 π d sin ϕ .
Based on (19), (35) and (36), E { Δ ϕ } = E { Δ θ } = 0 , and E { Δ ϕ 2 } is expressed as
c Δ ϕ = E { ( ϕ ^ ϕ ) ( ϕ ^ ϕ ) H } = λ 2 π d 2 1 λ v 1 2 π d 2 σ n 2 2 σ s 2 | α | 2 vec ( A ) H V 1 P b V 1 vec ( A ) ,
c Δ θ = E { ( θ ^ θ ) ( θ ^ θ ) H } = ( λ 2 π d sin ϕ ) 2 1 ( λ v 2 2 π d sin ϕ ) 2 σ n 2 2 σ s 2 | α | 2 vec ( A ) H V 2 P b V 2 vec ( A ) .
Based on (17), α ^ is rewritten as
α ^ = vec ( A ^ ) H ( G R F H ) s ( G R F H vec ( A ) α s + n ) = σ s 2 vec ( A ^ ) H vec ( A ) α + vec ( A ^ ) H ( G R F H ) s n ,
where vec ( A ^ ) H is calculated by the estimation of ( v ^ 1 , v ^ 2 ) . By using Taylor’s expansion, we approximate vec ( A ^ ) H as
vec ( A ^ ) H vec ( A ) + j vec ( A ) H V k Δ v k , k = 1 , 2 .
Substituting (40) into (39), α ^ in (39) can be written as
α ^ = σ s 2 ( vec ( A ) H + j vec ( A ) H V 1 Δ v 1 ) vec ( A ) α + vec ( A ^ ) H ( G R F H ) s n = α + j vec ( A ) H V 1 vec ( A ) Δ v 1 α + vec ( A ^ ) H ( G R F H ) s n .
Based on (19), the statistical characteristics of the estimation error of the mmWave path gain is calculated as
μ Δ α = E { Δ α } = E { j vec ( A ) H V 1 vec ( A ) Δ v 1 α + vec ( A ^ ) H ( G R F H ) s n } = 0 ,
c Δ α = E { ( α ^ α ) ( α ^ α ) H } = σ n 2 | vec ( A ) H V 1 vec ( A ) | 2 2 σ s 2 vec ( A ) H V 1 P b V 1 vec ( A ) + σ n 2 .

3.2. Location Validation

The location validation is implemented by comparing the similarity between the current channel parameters and the previous ones with preset thresholds, based on a binary hypothesis test. If we denote the difference between the current channel parameters (i.e., ϕ , α , θ ) at successive time as Θ ζ for ζ { ϕ , α , θ } , then we have
Θ ζ = l = 1 L ζ ^ l , X B ( t ) ζ ^ l , A B ( t 1 ) 2 , ζ { ϕ , α , θ } .
Let η ϕ , η θ and η α be preset thresholds for AAoA, EAoA and path gain, respectively. Next, we design a simple binary hypothesis testing for location validation as
H 0 : Θ ζ η ζ , ζ { ϕ , α , θ } , H 1 : Θ ζ > η ζ , ζ { ϕ , α , θ } ,
Under H 0 , the current transmitter is Alice. In contrast, H 1 means that the current transmitter is Eve.
The fundamental principle for the proposed scheme in this paper is that location validation decision is implemented by comparing the similarities between current estimated channel features at time t and previous ones at time t 1 with the corresponding preset thresholds, based on the framework of hypothesis testing theory. Channel statistics and the temporal values for AAoA, EAoA and path gain at time t 1 , and correlation coefficients can be modeled as side information that is known at both the transmitter (Alice) and the legitimate receiver (Bob), but not the adversary (Eve). The legitimate transmitter (Alice) and intended legitimate receiver (Bob) cooperate to secure communication transmission by means of the knowledge of this side information; this is beneficial for both partners. It should be stressed that the validation and efficiency of this idea were already studied from an information-theoretical point-of-view in [30], and the work [30] also provided the right guidance to the appropriate code design in practice.

4. Performance Analysis

In this section, we focus on the modeling of false alarm rate (denoted by P f ) and detection rate (denoted by P d ). To facilitate the calculation of the two probabilities, we denote P Θ ζ , H i the probability of ( Θ ζ > η ζ ) under H i for i = 1 , 2 and ζ { ϕ , α , θ } , and we consider σ ζ l , A B 2 = σ ζ A B 2 , and σ ζ l , E B 2 = σ ζ E B 2 . Based on authentication decision in (45), we establish the following lemmas regarding the probability P Θ ζ , H i .
Lemma 2. 
Based on (44) and (45), P Θ ϕ , H 0 is expressed by
P Θ ϕ , H i = exp η ϕ 2 σ ϕ , H i 2 z = 0 L 2 1 1 z ! η ϕ 2 σ ϕ , H i 2 z ,
where σ ϕ , H 0 2 = 2 ( 1 ρ ϕ ) σ ϕ A B 2 + 2 σ Δ ϕ 2 and σ ϕ , H 1 2 = σ ϕ E B 2 + σ ϕ A B 2 + 2 σ Δ ϕ 2 .
Proof. 
To calculate the probability distribution of Θ ϕ in (44), we define Λ ϕ as
Λ ϕ ϕ ^ l , X B ( t ) ϕ ^ l , A B ( t 1 ) .
Under H 0 , by substituting (9) into (47), Λ ϕ H 0 is obtained as
Λ ϕ H 0 = ϕ ^ l , A B ( t ) ϕ ^ l , A B ( t 1 ) = ( ρ ϕ 1 ) ϕ l , A B ( t 1 ) + 1 ρ ϕ 2 u ϕ , l , X B ( t ) + Δ ϕ l ( t ) Δ ϕ l ( t 1 ) .
One can see that Λ ϕ H 0 is a zero-mean Gaussian distribution with variance σ ϕ , H 0 2 = 2 ( 1 ρ ϕ ) σ ϕ A B 2 + 2 σ Δ ϕ 2 . Therefore, Θ ϕ under H 0 is a central chi-square distribution random variable and the PDF of Θ ϕ under H 0 is then written as
f Θ ϕ , H 0 ( x ) = x 2 σ ϕ , H 0 2 L 2 1 2 σ ϕ , H 0 2 Γ ( L / 2 ) exp x 2 σ ϕ , H 0 2 , x 0 ,
where Γ ( · ) is a Gamma function. The CDF of Θ ϕ under H 0 is written as
F Θ ϕ , H 0 ( x ) = 1 exp x 2 σ ϕ , H 0 2 z = 0 L 2 1 1 z ! x 2 σ ϕ , H 0 2 z .
Accordingly, P Θ ϕ , H 0 is written as
P Θ ϕ , H 0 = Pr { Θ ϕ > η ϕ | H 0 } = exp η ϕ 2 σ ϕ , H 0 2 z = 0 L 2 1 1 z ! η ϕ 2 σ ϕ , H 0 2 z .
Similarly, based on (47), we derive Λ ϕ H 1 under hypothesis H 1 as
Λ ϕ H 1 = ϕ ^ l , E B ( t ) ϕ ^ l , A B ( t 1 ) = ϕ l , E B ( t ) + Δ ϕ l ( t ) ϕ l , A B ( t 1 ) Δ ϕ l ( t 1 ) .
Because ϕ l , E B ( t ) , Δ ϕ l ( t ) , ϕ l , A B ( t 1 ) and Δ ϕ l ( t 1 ) are independent zero-mean Gaussian random variables with variances σ ϕ l , E B 2 , σ Δ ϕ 2 , σ ϕ l , A B 2 and σ Δ ϕ 2 , respectively, and then the PDF of Θ ϕ under H 1 is written as
f Θ ϕ , H 1 ( x ) = x 2 σ ϕ , H 1 2 L 2 1 2 σ ϕ , H 1 2 Γ ( L / 2 ) exp x 2 σ ϕ , H 1 2 , x 0 ,
where σ ϕ , H 1 2 = σ ϕ E B 2 + σ ϕ A B 2 + 2 σ Δ ϕ 2 . Then, the CDF of Θ ϕ under H 1 is written as
F Θ ϕ , H 1 ( x ) = 1 exp x 2 σ ϕ , H 1 2 z = 0 L 2 1 1 z ! x 2 σ ϕ , H 1 2 z .
According to (54), P Θ ϕ , H 1 is written as
P Θ ϕ , H 1 = Pr { Θ ϕ > η ϕ | H 1 } = exp η ϕ 2 σ ϕ , H 1 2 z = 0 L 2 1 1 z ! η ϕ 2 σ ϕ , H 1 2 z .
Lemma 3. 
Using (45), P Θ θ , H i ( i = 1 , 2 ) is evaluated as
P Θ θ , H i = exp η θ 2 σ θ , H i 2 z = 0 L 2 1 1 z ! η θ 2 σ θ , H i 2 z ,
where σ θ , H 0 2 = 2 ( 1 ρ θ ) σ θ A B 2 + 2 σ Δ θ 2 and σ θ , H 1 2 = σ θ E B 2 + σ θ A B 2 + 2 σ Δ θ 2 .
Lemma 4. 
Using (45), P Θ α , H i ( i = 1 , 2 ) is evaluated as
P Θ α , H i = exp η α 2 σ α , H i 2 z = 0 L 1 1 z ! η α 2 σ α , H i 2 z ,
where σ α , H 0 2 = 2 ( 1 ρ α ) σ α A B 2 + 2 σ Δ α 2 and σ α , H 1 2 = σ α E B 2 + σ α A B 2 + 2 σ Δ α 2 .
Based on the above lemmas, we can establish the following theorem regarding the closed expressions of P f and P d .
Theorem 1. 
For the mmWave MIMO communication model shown in Figure 1, P f and P d of the proposed authentication scheme are determined, respectively, as
P f = P Θ ϕ , H 0 P Θ θ , H 0 P Θ α , H 0 ,
P d = 1 ( 1 P Θ ϕ , H 1 ) ( 1 P Θ θ , H 1 ) ( 1 P Θ α , H 1 ) .
Suppose that Bob has no knowledge of the channel parameters from data frame at time t such as ζ ^ l , A B ( t 1 ) and ρ ζ for ζ { ϕ , α , θ } , l = 1 , . . . , L . In this case Θ ζ becomes
Θ ζ = l = 1 L ζ ^ l , X B ( t ) 2 , ζ { ϕ , α , θ } .
Following similar steps for the derivation of P Θ ζ , H i , we can obtain P Θ ζ , H i u with u being without the knowledge of channel parameters at time t 1 , and then we have
P Θ ϕ , H i u = exp η ϕ 2 σ ϕ , H i 2 z = 0 L 2 1 1 z ! η ϕ 2 σ ϕ , H i 2 z ,
P Θ θ , H i u = exp η θ 2 σ θ , H i 2 z = 0 L 2 1 1 z ! η θ 2 σ θ , H i 2 z ,
P Θ α , H i u = exp η α 2 σ α , H i 2 z = 0 L 1 1 z ! η α 2 σ α , H i 2 z ,
where σ ϕ , H 0 2 = σ ϕ A B 2 + σ Δ ϕ 2 , σ ϕ , H 1 2 = σ ϕ E B 2 + σ Δ ϕ 2 , σ θ , H 0 2 = σ θ A B 2 + σ Δ θ 2 , σ θ , H 1 2 = σ θ E B 2 + σ Δ θ 2 , σ α , H 0 2 = σ α A B 2 + σ Δ α 2 , and σ α , H 1 2 = σ α E B 2 + σ Δ α 2 . In this case, P f u and P d u of the proposed authentication scheme are determined, respectively, as
P f u = P Θ ϕ , H 0 u P Θ θ , H 0 u P Θ α , H 0 u ,
P d u = 1 ( 1 P Θ ϕ , H 1 u ) ( 1 P Θ θ , H 1 u ) ( 1 P Θ α , H 1 u ) .
Suppose that legitimate Alice and adversary Eve transmit signals to Bob with equal probability. We use P s to denote the secrecy rate improvement afforded by the knowledge of data frame at time t 1 for both legitimate transmitter and receiver, relative to the case in which the knowledge is not used. Then, P s can be calculated as
P s = 1 2 ( P f u P f + P d P d u )

5. Numerical Results

5.1. System Parameters and Simulation Settings

Let signal-to-noise ratio (SNR) denote as SNR = p σ n 2 and k ϕ = σ ϕ l , E B 2 σ ϕ l , A B 2 be the ratio of Eve’s and Alice’s AAoA variances. We use k θ = σ θ l , E B 2 σ θ l , A B 2 to denote the ratio of Eve’s and Alice’s EAoA variances, and k α = σ α l , E B 2 σ α l , A B 2 to denote the ratio of Eve’s and Alice’s path gain variances. We set the number of the receiver antennas as N r = M × N . In the simulations, the first frame is validated based on a higher layer verification scheme and the second frame is validated by using the proposed location verification scheme.

5.2. Impact of SNR on the Verification Performance

We plot in Figure 2 ROC (receiver operating characteristic, ROC) variations under the settings of ( N r = 128, L = 20, k ϕ = 2 dB, k θ = 2 dB, k α = 2 dB) at different SNRs. From Figure 2, we can see that the authentication performance ( P f and P d ) under SNR = 5 dB outperforms that of the others and the performance for SNR = −5 dB is poorest. This indicates that the SNRs have severe impacts on the authentication performance. One can improve the authentication performance by setting a higher SNR. However, the SNR level usually has a limit due to the practical conditions. In many practical environments, P f < 0.1 and P d > 0.9 are usually a required constraint pair to satisfy the requirements of a practical authentication system. As shown in Figure 2, the authentication performance ( P f and P d ) for SNR = 0 dB and SNR = 5 dB can satisfy the practical requirements and the performance at SNR = 5 dB is best. From Figure 2, we also can see that when P f is fixed, P d increases when SNR increases. This means that a higher SNR can lead to a better authentication performance.

5.3. Impact of the Number of Antennas on the Authentication Performance

We show in Figure 3 the ROC results under different receiver antenna numbers with the settings of (SNR = 10 dB, L = 20, k ϕ = 2 dB, k θ = 2 dB, k α = 2 dB). From Figure 3, we can see that the authentication performance ( P f , P d ) under 64 receiver antennas outperforms that of the others, and the performance under 16 receiver antennas is poorest. This is because multiple antennas can improve feature dimensions and further improve the authentication performance. When P f is fixed, P d increases when the number of receiver antennas increases. Moreover, the authentication performance ( P f , P d ) under 64 receiver antennas can satisfy the practical authentication requirements.

5.4. Impact of the Number of Multipaths on the Authentication Performance

We show in Figure 4 the ROC curves under different numbers of multipaths with the settings of (SNR = 10 dB, N r = 64, k ϕ = 2 dB, k θ = 2 dB, k α = 2 dB). From Figure 4, we can see that the authentication performance ( P f , P d ) under L = 15 multipaths outperforms that of the others, and the performance under L = 5 multipaths is poorest. This means that more multipaths can contribute to the authentication performance. We can also see that when P f is fixed, P d increases when the number of multipaths increases.

5.5. Impact of k α on the Authentication Performance

To investigate the impact of the distance between Eve–Bob and Alive–Bob on performance, we need to characterize σ α l , X B 2 being the variance of the path gain of the l-th propagation path from the transmitter X to Bob. According to [31], baseband path gain α l , X B is written as α l , X B = β l , X B exp ( j 2 π f c d l , X B c ) , where β l , X B is the attenuation coefficient of l-th propagation path and f c is carrier frequency. According to the Central Limit Theorem, the path gain can be modeled as a zero-mean complex circular symmetric Gaussian process and for large-scale fading channels, σ α l , X B 2 can be modeled by applying ([32], Chapter 2), as
σ α l , X B 2 = K d 0 d l , X B ς Ω ,
where K is a reference path gain value; d 0 is a reference distance for antenna far-field; ς is a path loss exponent ranging between 2 and 5 in free space propagation wireless environments; and Ω is a shadowing factor modeled as a log-normal random variable. Because the distance between the transmitter and receiver is much larger than antenna separation, we can use the approximation d l , X B d L , X B = d X B for X = { A , E } . From (67), we have σ α 1 , X B 2 σ α L , X B 2 = σ α X B 2 . Both Alice and Eve are assumed to be randomly deployed at arbitrary locations in a circular area centered on Bob, and there is no shadow fading in that area. By using (67), k α by dB value without shadow fading is given by k α = 10 ς log d A B d E B . We make an assumption (without loss of generality) that Alice is in a fixed location, i.e., d A B is a constant and we adjust the distance between Eve and Bob d E B to obtain different k α .
We show in Figure 5 how P d varies with k α under different P f s and with the settings of (SNR = 10 dB, N r = 128, L = 25, k ϕ = 2 dB, k θ = 2 dB). From Figure 5, P d increases when k α increases for a given P f . This clearly indicates that if Eve is closer to Bob, she might be successfully detected by Bob, and Eve might select an appropriate location in which she has a high probability of succesfully impersonating Alice. In addition, the authentication performance under P f = 0.08 outperforms that of the others, and the performance under P f = 0.02 is poorest. This is because a lower P f value means a stricter performance requirement and there would be a trade-off between P d and P f . We can also see from Figure 5 that when k α is fixed, P d increases when P f increases.

5.6. Performance Comparison

Figure 6 displays a performance comparison between the authentication scheme proposed in [16] and our scheme. From Figure 6, we can see that the performance ( P f , P d ) of our scheme jointly using AAoA, EAoA and path gain outperforms that of the scheme only using path gain [16]. This is because the scheme in [16] uses coarse-grained channel information while our scheme uses multi-dimensional mmWave MIMO channel features (i.e., AAoA, EAoA and path gain) to effectively utilize the fine-grained channel information. It is also noted that when P f increases, the detection rates of both schemes increase. Moreover, the authentication performance ( P f , P d ) of our scheme can better satisfy the practical authentication requirements. This is beneficial for exploiting both the AAoA and EAoA features, and allows us to gain important insights on the impacts of angle domain features on authentication performance.

5.7. Impact of ρ α on the Authentication Performance

We show in Figure 7 ROC variations under the settings of (SNR = 10 dB, N r = 128, L = 20, k ϕ = 2 dB, k θ = 2 dB, k α = 2 dB) at different correlation coefficients of path gain. From Figure 7, we can see that the authentication performance ( P f , P d ) under ρ α = 0.9 outperforms that of the others, and the performance under ρ α = 0.7 is the poorest. This is because a larger ρ α means that the communication entities move slower. When P f is fixed, P d increases when ρ α increases. Moreover, the authentication performance ( P f , P d ) under ρ α = 0.9 can satisfy the practical authentication requirements.

6. Conclusions

By utilizing multi-dimensional mmWave MIMO channel features, this paper developed a location verification scheme for mmWave MIMO communication systems. Furthermore, we modeled the three-dimensional mmWave channel features (i.e., AAoA, EAoA and path gain) and extracted these feature parameters through maximum-likelihood estimator. We also derived the analytical expressions for the typical performance metrics. Numerical results indicate that the proposed authentication scheme can benefit from using multi-dimensional mmWave channel features. The results in this paper reveal that the proposed scheme is general in nature and can be applied to more communication systems, and we expect the methodology developed in this paper to be valuable for devising new physical layer authentication schemes in other network scenarios.

Author Contributions

Conceptualization, Y.L. and P.Z.; methodology, Y.L.; validation, J.H., Y.L. and P.Z.; investigation, P.Z.; writing—original draft preparation, P.Z.; writing—review and editing, J.H.; funding acquisition, J.H. All authors have read and agreed to the published version of the manuscript.

Funding

This work was supported in part by the Natural Science Foundation of China (NSFC) Grant (62272241), Japan Society for the Promotion of Science (JSPS) Grant (18H03235), and Nanjing University of Posts and Telecommunications Scientific Research Foundation Grant (NY221122).

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

Not applicable.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Wu, F.; Xu, L.; Kumari, S.; Li, X.; Shen, J.; Choo, K.R.; Wazid, M.; Das, A.K. An efficient authentication and key agreement scheme for multi-gateway wireless sensor networks in IoT deployment. J. Netw. Comput. Appl. 2017, 89, 72–85. [Google Scholar] [CrossRef]
  2. Esfahani, A.; Mantas, G.; Matischek, R.; Saghezchi, F.B.; Rodriguez, J.; Bicaku, A.; Maksuti, S.; Tauber, M.G.; Schmittner, C.; Bastos, J. A lightweight authentication mmechanism for M2M communications in industrial IoT environment. IEEE Internet Things J. 2019, 6, 288–296. [Google Scholar] [CrossRef]
  3. Stergiou, C.; Psannis, K.E.; Kim, B.; Gupta, B.B. Secure integration of IoT and cloud computing. Future Gener. Comput. Syst. 2018, 78, 964–975. [Google Scholar] [CrossRef]
  4. Wang, X.; Hao, P.; Hanzo, L. Physical-layer authentication for wireless security enhancement: Current challenges and future developments. IEEE Commun. Mag. 2016, 54, 152–158. [Google Scholar] [CrossRef] [Green Version]
  5. Xie, N.; Chen, J.; Huang, L. Physical-layer authentication using multiple channel-based features. IEEE Trans. Inf. Forensics Secur. 2021, 16, 2356–2366. [Google Scholar] [CrossRef]
  6. Tang, J.; Xu, A.; Jiang, Y.; Zhang, Y.; Wen, H.; Zhang, T. MmWave MIMO physical layer authentication by using channel sparsity. In Proceedings of the 2020 IEEE International Conference on Artificial Intelligence and Information Systems (ICAIIS), Dalian, China, 20–22 March 2020; pp. 221–224. [Google Scholar]
  7. Maeng, S.J.; Yapici, Y.; Güvenç, I.; Dai, H.; Bhuyan, A. Power allocation for fingerprint-based PHY-Layer authentication with mmWave UAV networks. In Proceedings of the ICC 2021-IEEE International Conference on Communications, Montreal, QC, Canada, 14–23 June 2021; IEEE: Piscataway, NJ, USA, 2021; pp. 1–6. [Google Scholar]
  8. Lord, S.F. 5G Millimeter-Wave Physical-Layer Authentication with Planar Reflectors. Ph.D. Thesis, Naval Postgraduate School, Monterey, CA, USA, 2019. [Google Scholar]
  9. Wang, N.; Li, W.; Wang, P.; Alipour-Fanid, A.; Jiao, L.; Zeng, K. Physical layer authentication for 5G communications: Opportunities and road ahead. IEEE Netw. 2020, 34, 198–204. [Google Scholar] [CrossRef]
  10. Wang, N.; Wang, P.; Alipour-Fanid, A.; Jiao, L.; Zeng, K. Physical-layer security of 5G wireless networks for IoT: Challenges and opportunities. IEEE Internet Things J. 2019, 6, 8169–8181. [Google Scholar] [CrossRef]
  11. Wang, N.; Jiao, L.; Wang, P.; Dabaghchian, M.; Zeng, K. Efficient identity spoofing attack detection for IoT in mm-Wave and Massive MIMO 5G communication. In Proceedings of the IEEE Global Communications Conference, GLOBECOM 2018, Abu Dhabi, United Arab Emirates, 9–13 December 2018; IEEE: Piscataway, NJ, USA, 2018; pp. 1–6. [Google Scholar]
  12. Wang, N.; Jiao, L.; Alipour-Fanid, A.; Dabaghchian, M.; Zeng, K. Pilot contamination attack detection for NOMA in 5G mm-Wave massive MIMO networks. IEEE Trans. Inf. Forensics Secur. 2020, 15, 1363–1378. [Google Scholar] [CrossRef]
  13. Wang, N.; Li, W.; Alipour-Fanid, A.; Jiao, L.; Dabaghchian, M.; Zeng, K. Pilot contamination attack detection for 5G mmWave grant-Free IoT networks. IEEE Trans. Inf. Forensics Secur. 2021, 16, 658–670. [Google Scholar] [CrossRef]
  14. Wang, N.; Jiao, L.; Wang, P.; Li, W.; Zeng, K. Exploiting beam features for sspoofing attack detection in mmWave 60-GHz IEEE 802.11ad networks. IEEE Trans. Wirel. Commun. 2021, 20, 3321–3335. [Google Scholar] [CrossRef]
  15. Wang, N.; Jiao, L.; Wang, P.; Li, W.; Zeng, K. Machine learning-based spoofing attack detection in MmWave 60GHz IEEE 802.11ad Networks. In Proceedings of the 39th IEEE Conference on Computer Communications, INFOCOM 2020, Toronto, ON, Canada, 6–9 July 2020; IEEE: Piscataway, NJ, USA, 2020; pp. 2579–2588. [Google Scholar]
  16. Xiao, L.; Greenstein, L.J.; Mandayam, N.B.; Trappe, W. Channel-based spoofing detection in frequency-selective Rayleigh channels. IEEE Trans. Wirel. Commun. 2009, 8, 5948–5956. [Google Scholar] [CrossRef] [Green Version]
  17. Xiao, L.; Wan, X.; Han, Z. PHY-Layer authentication with multiple landmarks with reduced overhead. IEEE Trans. Wirel. Commun. 2018, 17, 1676–1687. [Google Scholar] [CrossRef]
  18. Liu, F.J.; Wang, X. Physical layer authentication enhancement using two-dimensional channel quantization. IEEE Trans. Wirel. Commun. 2016, 15, 4171–4182. [Google Scholar] [CrossRef]
  19. Alkhateeb, A.; Ayach, O.E.; Leus, G., Jr.; Heath, R.W. Channel estimation and hybrid precoding for millimeter Wave cellular systems. IEEE J. Sel. Top. Signal Process. 2014, 8, 831–846. [Google Scholar] [CrossRef] [Green Version]
  20. Méndez-Rial, R.; Rusu, C.; Alkhateeb, A.; González Prelcic, N.; Heath, R.W., Jr. Channel estimation and hybrid combining for mmWave: Phase shifters or switches? In Proceedings of the 2015 Information Theory and Applications Workshop, ITA 2015, San Diego, CA, USA, 1–6 February 2015; IEEE: Piscataway, NJ, USA, 2015; pp. 90–97. [Google Scholar]
  21. Singh, J.; Ramakrishna, S. On the feasibility of codebook-based beamforming in millimeter wave systems with multiple antenna arrays. IEEE Trans. Wirel. Commun. 2015, 14, 2670–2683. [Google Scholar] [CrossRef]
  22. Hemadeh, I.A.; Satyanarayana, K.; El-Hajjar, M.; Hanzo, L. Millimeter-wave communications: Physical channel models, design considerations, antenna constructions, and link-budget. IEEE Commun. Surv. Tutor. 2018, 20, 870–913. [Google Scholar] [CrossRef] [Green Version]
  23. Fan, D.; Gao, F.; Liu, Y.; Deng, Y.; Wang, G.; Zhong, Z.; Nallanathan, A. Angle domain channel estimation in hybrid millimeter wave massive MIMO systems. IEEE Trans. Wirel. Commun. 2018, 17, 8165–8179. [Google Scholar] [CrossRef]
  24. Buzzi, S.; D’Andrea, C. On clustered statistical MIMO millimeter wave channel simulation. arXiv 2016, arXiv:1604.00648. [Google Scholar]
  25. Ayach, O.E.; Rajagopal, S.; Abu-Surra, S.; Pi, Z.; Heath, R.W., Jr. Spatially sparse precoding in millimeter wave MIMO systems. IEEE Trans. Wirel. Commun. 2014, 13, 1499–1513. [Google Scholar] [CrossRef] [Green Version]
  26. Shen, W.; Dai, L.; Shim, B.; Wang, Z.; Heath, R.W., Jr. Channel feedback based on AoD-adaptive subspace codebook in FDD massive MIMO systems. IEEE Trans. Commun. 2018, 66, 5235–5248. [Google Scholar] [CrossRef] [Green Version]
  27. Xie, N.; Zhang, S. Blind authentication at the physical layer under time-varying fading channels. IEEE J. Sel. Areas Commun. 2018, 36, 1465–1479. [Google Scholar] [CrossRef]
  28. Médard, M. The effect upon channel capacity in wireless communications of perfect and imperfect knowledge of the channel. IEEE Trans. Inf. Theory 2000, 46, 933–946. [Google Scholar] [CrossRef] [Green Version]
  29. Kay, S.; Hall, P. Fundamentals of statistical signal processing, Volume II: Detection theory. Technometrics 1993, 37, 465–466. [Google Scholar]
  30. Zaidi, A.; Vandendorpe, L. Coding schemes for relay-assisted information embedding. IEEE Trans. Inf. Forensics Secur. 2009, 4, 70–85. [Google Scholar] [CrossRef]
  31. Tse, D.; Viswanath, P. Fundamentals of Wireless Communication; Cambridge University Press: Cambridge, UK, 2005. [Google Scholar]
  32. Goldsmith, A. Wireless Communications; Cambridge University Press: Cambridge, UK, 2005. [Google Scholar]
Figure 1. System model.
Figure 1. System model.
Sensors 22 09202 g001
Figure 2. ROC curves under different SNRs with the settings of ( N r = 128, L = 20, k ϕ = 2 dB, k θ = 2 dB, k α = 2 dB).
Figure 2. ROC curves under different SNRs with the settings of ( N r = 128, L = 20, k ϕ = 2 dB, k θ = 2 dB, k α = 2 dB).
Sensors 22 09202 g002
Figure 3. ROC curves under different numbers of receiver antennas with the settings of (SNR = 10 dB, L = 20, k ϕ = 2 dB, k θ = 2 dB, k α = 2 dB).
Figure 3. ROC curves under different numbers of receiver antennas with the settings of (SNR = 10 dB, L = 20, k ϕ = 2 dB, k θ = 2 dB, k α = 2 dB).
Sensors 22 09202 g003
Figure 4. ROC curves under different numbers of multipaths with the settings of (SNR = 10 dB, N r = 64, k ϕ = 2 dB, k θ = 2 dB, k α = 2 dB).
Figure 4. ROC curves under different numbers of multipaths with the settings of (SNR = 10 dB, N r = 64, k ϕ = 2 dB, k θ = 2 dB, k α = 2 dB).
Sensors 22 09202 g004
Figure 5. P d vs. k α with the settings of (SNR = 10 dB, N r = 128, L = 25, k ϕ = 2 dB, k θ = 2 dB).
Figure 5. P d vs. k α with the settings of (SNR = 10 dB, N r = 128, L = 25, k ϕ = 2 dB, k θ = 2 dB).
Sensors 22 09202 g005
Figure 6. Performance comparison between the scheme in [16] and our scheme with the settings of (SNR = 5 dB, N r = 128, L = 20, k ϕ = 2 dB, k θ = 2 dB, k α = 2 dB).
Figure 6. Performance comparison between the scheme in [16] and our scheme with the settings of (SNR = 5 dB, N r = 128, L = 20, k ϕ = 2 dB, k θ = 2 dB, k α = 2 dB).
Sensors 22 09202 g006
Figure 7. ROC curves under different correlation coefficients of path gain with the settings of (SNR = 10 dB, N r = 128, L = 20, k ϕ = 2 dB, k θ = 2 dB, k α = 2 dB).
Figure 7. ROC curves under different correlation coefficients of path gain with the settings of (SNR = 10 dB, N r = 128, L = 20, k ϕ = 2 dB, k θ = 2 dB, k α = 2 dB).
Sensors 22 09202 g007
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

Zhang, P.; Liu, Y.; He, J. Utilizing Multi-Dimensional MmWave MIMO Channel Features for Location Verification. Sensors 2022, 22, 9202. https://doi.org/10.3390/s22239202

AMA Style

Zhang P, Liu Y, He J. Utilizing Multi-Dimensional MmWave MIMO Channel Features for Location Verification. Sensors. 2022; 22(23):9202. https://doi.org/10.3390/s22239202

Chicago/Turabian Style

Zhang, Pinchang, Yangyang Liu, and Ji He. 2022. "Utilizing Multi-Dimensional MmWave MIMO Channel Features for Location Verification" Sensors 22, no. 23: 9202. https://doi.org/10.3390/s22239202

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop