1. Introduction
Wireless communication is more vulnerable to eavesdropping and spoofing attacks due to its broadcast nature. Conventionally, the security of wireless networks is addressed by cryptographic protocols above the physical layer that primarily depend on the computation complexity [
1]. With the rapid development of advanced computers, wireless networks urgently demand more comprehensive protections that need to be lightweight, flexible, and compatible besides maintaining security [
2], especially in the upcoming 6G. Ref. [
3] mentioned the trend of using UAV to build cellular networks, and the security of physical layer must be considered.
At present, physical-layer authentication can be divided into three types according to the unique characteristics of extracted signals as follows: (1) authentication based on channel characteristics [
4]; (2) authentication based on signal watermarking [
5]; (3) authentication based on radio frequency fingerprint [
6]. Among them, physical-layer authentication based on channel characteristics is widely studied because of its low computational complexity and broad signal format requirements.
Physical-layer authentication exploits the physical characteristics of channels, devices, and signals to meet the requirements of flexibility and compatibility [
4]. The principle of channel-based physical-layer authentication is that the channel response decorrelates rapidly from one transmit–receive path to another if the paths are separated by the order of a wavelength [
7]. Specifically, Xiao et al. [
8,
9] proposed authentication schemes and practical test statistics by analyzing the time and frequency domain of channels. Liu and Wang in [
10] proposed an enhanced scheme that integrates multipath delay characteristics into the channel impulse response (CIR)-based physical-layer authentication. With the development of artificial intelligence technology, it was also applied in various fields of communication, including physical-layer authentication. In [
11], machine learning was used for physical-layer authentication, and in [
12], deep learning was used to optimize UAV trajectory.
In large-scale wireless communication scenarios represented by the Internet of Things and 6G mobile communication network, terminal devices are widely distributed and resource allocation is limited. Power distribution is becoming an issue to be considered. The D2D communication proposed in [
13] requires optimal power distribution. End-to-end communication usually requires relays for assistance, and there are only a few research works at present. Zhang et al. in [
14] jointly utilized the location-specific features of both amplitude and delay interval of cascaded channels in authentication, while the multipath was assumed to be identical regarding variation in simplifying the consideration; the effects of noise at the relay were not analyzed. We explore the authentication scheme with cascaded channel frequency response based on research on independent subcarriers in the frequency domain, and then we derive theoretical expression of false alarm rate (FAR) and miss detection rate (MDR). Based on the above, we further derive and analyze the way of optimal power distribution.
The remainder of this paper is organized as follows.
Section 2 describes the system model.
Section 3 describes an authentication scheme with cascaded channel frequency response and a simplified scheme based on majority voting.
Section 4 derives the theoretical expressions of FAR and MDR and provides decision threshold under different criteria.
Section 5 explores the optimal power allocation by deriving the upper bound for the sum of FAR and MDR. Simulation results and analysis are shown in
Section 6.
Section 7 concludes the paper.
For the sake of comparison, above schemes are shown in
Table 1.
2. System Model
As shown in
Figure 1, we consider a ubiquitous dual-hop wireless network model with four entities that are represented by Alice (A), Eve (E), Relay (R), and Bob (B). Due to long distance, Alice and Bob can not communicate directly, and node R is required to relay signals. Alice and Eve are in different places, so their signals reach the relay through different buildings, indicating that the two sides pass through different multipath channels in the first hop. Whether the signal is sent by Alice or Eve, Relay amplifies and forwards signals to Bob. Supposing that the last frame Bob received is from Alice, if the new frame Bob receives is from Alice, its channel characteristics will have a strong correlation with the previous frame. Otherwise, if it is from Eve, the channel from Eve to the Relay and the channel from Alice to the Relay are independent, and the channel characteristics will be different from the previous frame so that Bob can use this feature to identify the sender.
Assuming that there are abundant reflectors in the propagation environment, each segment of the cascade channel can be considered as a time-varying multipath channel. Alice sends signal
with Power
, and Relay receives and forwards it to Bob with amplification factor
. Transmission power of Eve is
, which is supposed to imitate Alice. Thus, the signal Bob receives can be presented as:
where ∗ is signal convolution, and
is the channel impulse response of
multipath of the first hop.
and
are additive white Gaussian noises (AWGN) at
R and
B, the powers of which are denoted by
and
, respectively. Relay retransmits the received signal to Bob at power
, and the multiplied amplification factor is:
The work in [
14] obtains multiple independent detection statistics by assuming multipath channels have the same average gain and different delay to improve detection probability. Considering the actual situation, multipath channels usually have different gain levels, and this paper uses the broadband multicarrier transmission mode to obtain multiple channel fading coefficients in the frequency domain to expand the application scenarios. The signal Bob receives in frequency domain can be presented as:
where
and
are the channel frequency responses of
X-
R and
R-
B on the
kth subcarrier at time
t.
To describe the temporal variation of channel frequency response in each hop between two adjacent time instants, we employ the auto-regressive model of order 1 in [
10], which can be expressed as:
where
and
are complex Gaussian variables that are independent of
and
respectively, as denoted by
∼
and
∼
.
and
are correlation coefficients between samples spaced by
T in the first and second hop, given by:
where
is the zero order Bessel function of the first kind,
and
are the maximum Doppler frequency of two channels, respectively, and T is the time duration of an orthogonal frequency division multiplexing (OFDM) symbol.
Bob receives signal and uses pilot information to estimate frequency response of cascade channel. Without loss of generality, with the least square method, results can be expressed as:
where
and
are the estimation error caused by AWGN and can be modeled as complex Gaussian variables with zero mean, and the variance is denoted by
and
[
9]. In Formula (
6), the first term is the effective term, and the last two terms are equivalent noise terms.
follows complex Gaussian distribution. No matter whether the current message is from
A or
E, the second hop it passes through is
R-
B, and
B can extract the channel frequency response of
R-
B by exploiting channel estimation technique in [
14,
15].
6. Simulation Results
In this section, for the purpose of validating the theoretical results of
Section 4 and
Section 5, we use MATLAB to simulate the theoretical results.
We define the signal-noise ratio (SNR) of the dual-hop wireless networks in the concerned scenario as the total power transmitted to the noise power, given by:
The key simulation parameter settings are illustrated in
Table 2 and
Table 3.
As shown in
Table 2, carrier frequency, subcarrier interval and channel parameters used in the table are typical LTE system parameters [
16]. In addition, the number of subcarriers corresponds to the minimum bandwidth of 1.25 MHz in LTE. In fact, with the increase in bandwidth, the number of independent subcarriers that can be obtained in the frequency domain increases, which will be more favorable to the algorithm in this paper. The false alarm probability of identity authentication is selected as a typical value of 5%.
Without loss of generality, the coherent bandwidth can be calculated by the parameters in the
Table 2. Moreover, independent subcarriers can be selected, and the total transmit power is assumed to be 1.
To explore the difference in authentication performance between likelihood ratio test (LRT) and majority voting algorithm (MV), we compare them in terms of the probability of detection while keeping FAR constant as 0.05. The threshold involved in MV is theoretically derived, while the decision threshold in LRT is found by exhaustive method to keep FAR constant. We also attempt to find the threshold while ignoring the influence of cascade channel, as well as the threshold based on single-carrier threshold multiplied by the number of independent subcarriers. The simulation results are shown in
Figure 2 (the vertical axis represents the detection probability, and the horizontal axis the signal-to-noise ratio).
As shown in
Figure 2, MV is better than two experimental LRTs, while exhaustive is better than MV. Because the temporal channel variation on different subcarriers can be summed up in LRT, which has a smooth effect. While the decision on each subcarrier can be regard as one-bit quantization, and some precision is lost. The gap between exhaustive LRT, experimental-1 LRT, experimental-2 LRT, and MV reduces in the high SNR region, where the detection probability is more than 95%, meeting the requirements of general systems.
To validate the theoretical expression for FAR and MDR, derived in Formulas (
21) and (
25), we compare them with simulation results. In MV algorithm, we can adjust the decision threshold to realize constant FAR as needed, and the probability of detection with different FAR is shown in
Figure 3 (the vertical axis represents the detection probability and the horizontal axis the signal-to-noise ratio).
In
Figure 3, the theoretical results are consistent with simulation results under different parameters, which prove the correctness of the formulas Formulas (
21) and (
25). The authentication based on majority voting algorithm can be a theoretically analyzed performance, which is a major advantage over LRT and also makes it more practical. Under constant false alarm condition, the missed detection probability tends to a minimum value with the increase in SNR by optimizing the threshold.
To validate minimum error probability threshold proposed in Formula (
29), we compare sum of FAR and MDR in three simulation scenarios that are optimal: 5% FAR and 3% FAR. As shown in
Figure 4, optimal threshold is below the other two curves, which meets its physical meaning. In addition, two curves with different FARs intersect, since at low SNR, the difference between legal and illegal transmitter is small, causing MDR to go down as FAR goes up, and this is the opposite case when SNR is high.
To prove the universality of the threshold Formula (
29), comparative analysis was conducted in several different scenarios, which are characterized by the noise power at relay since the total noise power was controlled as one. In
Figure 5, authentication performance of theory and exhaustion fits perfectly in three scenarios.
To compare authentication under two power allocation schemes, we perform simulation at different SNRs, and results are shown in
Figure 6. As shown in
Figure 6, optimal scheme is better than equal allocation, especially at low SNR, since difference between legal and illegal transmitter has more influence than noise at high SNR.
To validate the performance of the theoretically approximate optimal scheme, we compare it with exhaustive optimal scheme in
Figure 7, where theoretical approximate optimal scheme is derived in Formula (
48) and exhaustive optimal scheme is designed to exhaust power allocation with small granularity. As shown in
Figure 7, the gap between the practical minimum sum of FAR and MDR and the sum caused by the proposed power allocation is about 0.002. The small gap implies that Formula (
48) is approximately optimal and effective in practice.
7. Conclusions
This paper explored channel-based physical-layer authentication in dual-hop wireless networks. By analyzing the characteristics of cascaded channel, we established the likelihood ratio test (LRT) at first. To simplify, the majority voting algorithm was employed. Based on this simplification, we derived the theoretical expressions for false alarm rate (FAR) and miss detection rate (MDR), and we analyzed the upper bound for their sum. Moreover, we proposed an optimal decision threshold that utilized the channel estimation of the second hop to provide a more accurate decision. With this threshold, the optimal power allocation minimizing the sum of FAR and MDR was derived. In addition, it is expected that the proposed power allocation is useful and provides a novel mode of thought in optimizing dual-hop physical-layer authentication. When in a mobile state, the authentication performance based on channel characteristics declines. Adjusting the number and position of pilots used for authentication can optimize the performance. In addition, the algorithm can be further optimized by channel state prediction and other technologies.
To sum up, in 6G large-scale heterogeneous network, there are a large number of devices with different upper-layer access protocols.The physical-layer authentication technology is transparent to the upper-layer protocols, and thus it has good compatibility and can complement the existing upper-layer traditional security schemes to jointly build a more comprehensive security system.