Next Article in Journal
Reverse Engineering the Branch Target Buffer Organizations on Apple M2
Previous Article in Journal
Multiple Attention Group Event Recommendation with Fine-Grained Features
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Physical Layer Authentication Exploiting Multipath Delay Fingerprints in Millimeter-Wave Communication Systems

1
National Key Laboratory of Electromagnetic Space Security, Jiaxing 314000, China
2
School of Computer Science, Nanjing University of Posts and Telecommunications, Nanjing 210023, China
3
School of Computer Science and Technology, Xidian University, Xi’an 710126, China
*
Authors to whom correspondence should be addressed.
Electronics 2025, 14(23), 4682; https://doi.org/10.3390/electronics14234682
Submission received: 2 October 2025 / Revised: 19 November 2025 / Accepted: 25 November 2025 / Published: 27 November 2025
(This article belongs to the Special Issue Security and Privacy Challenges in Next-Generation Wireless Networks)

Abstract

To effectively address the issue of identity spoofing attacks in millimeter-wave (mmWave) systems, this paper proposes a physical layer authentication (PLA) mechanism that leverages multipath delay fingerprint features to enhance the system’s resilience to impersonation. A detailed mmWave channel model is constructed, and a precise method for estimating and extracting multipath delay features is developed. The device authentication task is formulated as a binary hypothesis testing problem, for which closed-form expressions for the probability of false alarm and the probability of detection are derived, providing a theoretical guarantee for the performance of the proposed scheme. Simulation results demonstrate that the proposed mechanism can effectively mitigate the threat of identity spoofing in mmWave communication environments.

1. Introduction

Millimeter-wave (mmWave) technology is a cornerstone of sixth-generation (6G) communication and future networks, offering advantageous characteristics such as high data rates, low latency, and receiver diversity [1]. The short wavelength of mmWave facilitates the integration of large antenna arrays into compact receiver form factors, leading to the development of mmWave Single-Input Multiple-Output (SIMO) systems. These systems represent a key enabling technology for a wide range of applications, including the Internet of Things (IoT) [2]. Compared to Multiple-Input Multiple-Output (MIMO) systems equipped with multiple antennas at both the transmitter and receiver ends, the SIMO architecture offers a more cost-effective and practical solution for many millimeter-wave applications, particularly in the IoT domain. This preference stems primarily from the fact that transmitting devices in IoT applications—such as sensors, wearables, or terminals—typically face extremely stringent constraints on size, cost, and power consumption. Integrating the multi-antenna arrays and corresponding RF chains required for MIMO systems onto these devices is often technically and economically infeasible. SIMO systems ingeniously address this challenge by shifting the system complexity to the receiver. The transmitter can maintain a minimalist design with a single antenna, thereby minimizing power consumption and hardware costs. The receiver, typically subject to less stringent constraints, can instead be configured with a large-scale multiple-output antenna array. This enables high receiver diversity gains, effectively countering the path loss and fading inherent in millimeter-wave channels, and ensuring reliable communication and signal quality. Therefore, the millimeter-wave SIMO system architecture discussed in this paper represents a critical and practical choice in balancing performance, cost, and power consumption constraints. However, the broadcast nature of wireless channels renders mmWave SIMO systems susceptible to spoofing attacks, where an illicit transmitter impersonates a legitimate entity to deceive the receiver, thereby gaining unauthorized access to execute further malicious activities. To mitigate this threat, device authentication has become a critical defense mechanism. Unlike higher-layer authentication schemes based on cryptography, physical layer authentication (PLA) verifies a transmitter’s identity by leveraging intrinsic physical layer characteristics, such as channel features and hardware fingerprints. PLA offers notable advantages, including high security, low complexity, and strong compatibility [3,4,5,6], making it a vital supplement to conventional cryptographic methods.
PLA is broadly categorized into hardware fingerprinting-based and channel-based authentication, distinguished by the exploited physical layer features [7]. Regarding hardware fingerprinting, Hou et al. [8] proposes a hypothesis-based authentication scheme that utilizes the time-varying carrier frequency offset (CFO) in dynamic environments. In the domain of channel-based authentication, Xiao et al. [6] utilized multiple landmarks to enhance transmitter resolution via received signal strength indicator (RSSI) features, subsequently proposing a logistic regression-based authentication scheme. Exploiting the sparse characteristics of the mmWave MIMO channel, the work in [9] extracts virtual angle of arrival (AoA) features from the virtual channel and formulates a binary hypothesis test to validate the transmitter.
While existing mechanism enhance wireless security, PLA in the context of mmWave SIMO systems remains underexplored. Such systems exhibit unique physical layer characteristics not present in conventional networks, particularly the multipath time delay features within the channel, which are highly suitable for identity validation. Accordingly, this paper introduces a novel PLA scheme for mmWave SIMO systems that leverages these distinctive delay characteristics. In particular, we first develop an efficient method to estimate and extract the requisite multipath time delay features. Subsequently, employing principles from statistical signal processing and hypothesis testing, we derive closed-form expressions for the key performance metrics of false alarm and detection probabilities. Finally, the practical effectiveness and robustness of the proposed authentication framework are validated through comprehensive simulations under a range of estimation conditions.
The rest of this paper is organized as follows. The system model and problem formulation are introduced in Section 2. Section 3 presents the proposed PLA scheme. The false alarm and detection probabilities are derived in Section 4. Section 5 provides the simulation results, and Section 6 concludes the paper.

2. Problem Formulation and System Model

2.1. Problem Formulation

This paper considers a canonical three-party model within an mmWave SIMO OFDM system. As shown in Figure 1, the model consists of the following entities: A legitimate transmitter Alice with a single antenna, who attempts to send data frames to the intended receiver; the intended receiver Bob, equipped with N r antennas, Bob’s objective is to accurately verify the identity of the incoming transmitter; and an illegitimate transmitter Eve who seeks to gain access to Bob by spoofing Alice’s identity, with the potential to launch subsequent advanced attacks [5,6,10]. It is assumed that the multipath delay estimation and authentication scheme employed by Bob is unknown to the adversary, Eve. However, certain public information, such as the frame format, may be accessible to Eve by analyzing the structure of intercepted signal frames due to the open nature of the wireless medium.
The authentication process is predicated on the reception of two consecutive signal frames. The first frame is presumed to have been authenticated as originating from Alice through a conventional upper-layer mechanism. During the reception of this initial frame, Bob executes the proposed delay estimation algorithm to extract multipath delay features from the channel. These features are then stored as a reference channel fingerprint for use in subsequent authentication challenges. This work does not consider the scenario of composite signals resulting from simultaneous transmissions by Alice and Eve. It is assumed that Bob’s receiver would discard any such collided frames. The system employs the CSMA/CA protocol to govern medium access and manage the transmission schedule.

2.2. Channel Model

A mmWave SIMO OFDM system is considered in this paper. The transmitter, Alice or Eve, has a single antenna, and the receiver Bob has N r antennas. Similar to [11], by considering the multipath delay feature, the mmWave SIMO OFDM channel vector at subcarrier d ( d = 1 , 2 , , D ) can be modeled as
h d = m = 1 M α m e j 2 π f d τ m a d ( ϕ m , θ m ) ,
where α m denotes the complex amplitude of the m-th propagation path. ϕ m and θ m are the azimuth and elevation angles of arrival of the m-th path, respectively. a d ( ϕ m , θ m ) is the array response vector. f d is the frequency at the d-th subcarrier and f d = f 0 + d Δ F , where f 0 is the subcarrier frequency at the lower end of the band and Δ F is the spacing between any two subcarriers. τ m represents the time delay of the m-th propagation path.
The base station Bob exploits a hybrid uniform cylindrical array (UCyA), which consists of N 1 horizontal layers of uniform circular arrays (UCAs), each having N 2 antennas, i.e., N r = N 1 N 2 . The radius of each UCA is represented by r. The vertical distance between any two adjacent UCAs is represented by h. Therefore, the array response vector is expressed by
a d ( ϕ m , θ m ) = a 1 , d ( θ m ) a 2 , d ( ϕ m , θ m ) ,
where
[ a 1 , d ( θ m ) ] n 1 , 1 = 1 N 1 exp j 2 π c f d h n 1 N 1 + 1 2 cos ( θ m )
[ a 2 , d ( ϕ m , θ m ) ] n 2 , 1 = 1 N 2 exp j 2 π c f d r sin ( θ m ) cos ( ϕ m φ n 2 )
are the array response vectors of the vertical and horizontal directions, respectively. n 1 = 1 , 2 , , N 1 and n 2 = 1 , 2 , , N 2 denote the index of the above array response vectors, respectively.
According to the characteristics of different random distributions, the multipath time delay is modeled as a Poisson distribution [12]. Thus, the time interval between any two adjacent multipath time delays obeys an independent and identical exponential distribution and can be expressed by
q i ( t ) = τ i + 1 ( t ) τ i ( t ) , i = 1 , 2 , , M 1 .
To model the time-varying characteristics between q i ( t ) and q i ( t 1 ) more conveniently, Gaussian random variables can be used to model correlated exponential random variables [13]. Generally, an exponential random variable can be written as a sum of the squares of two independent Gaussian random variables. Thus, q i at time t and t 1 can be written equivalently and, respectively, as
q i ( t ) = ( q 1 , i ( t ) ) 2 + ( q 2 , i ( t ) ) 2 ,
q i ( t 1 ) = ( q 1 , i ( t 1 ) ) 2 + ( q 2 , i ( t 1 ) ) 2 ,
where q 1 , i and q 2 , i are two independent Gaussian random variables with zero mean and variance σ q 2 , i.e., q 1 , i , q 2 , i N ( 0 , σ q 2 ) . Further, q i is now an exponential random variable with parameter λ = 1 2 σ q 2 , i.e., q i exp ( 1 2 σ q 2 ) .
Similar to previous works [14,15], we use a first-order Gauss–Markov process to characterize time-varying multipath time delays [16,17], and therefore, q 1 , i and q 2 , i are mathematically expressed, respectively, as
q 1 , i ( t ) = ρ q 1 , i ( t 1 ) + ( 1 ρ 2 ) σ q 2 u 1 ( t 1 ) ,
q 2 , i ( t ) = ρ q 2 , i ( t 1 ) + ( 1 ρ 2 ) σ q 2 u 2 ( t 1 ) ,
where ρ denotes the multipath time delay correlation coefficient. u 1 and u 2 are two independent Gaussian random variables with zero mean, i.e., u 1 , u 2 N ( 0 , σ q 2 ) .
The correlation coefficient ρ is directly related to the channel coherence time, which is inversely affected by the Doppler spread caused by mobility. In practical scenarios, movement of the transmitter, receiver, or surrounding scatterers introduces non-static channel conditions. This mobility leads to a faster channel decorrelation over time, corresponding to a lower value of ρ . Therefore, our time-varying channel model inherently captures the statistical impact of mobility. A higher degree of mobility will widen the distribution of the channel variation between authentication attempts. This effect is explicitly accounted for in our theoretical performance analysis in Section 4, as the derivation of P f is directly dependent on ρ . A highly dynamic environment would naturally increase the dissimilarity between consecutive channel fingerprints, posing a greater challenge to the authentication system, which is a key aspect evaluated in our model.

2.3. Communication Model

Consider Bob receives a data frame from an unknown transmitter X. The aim of Bob is to verify the identity of the transmitter. We consider a hybrid front-end architecture as in [18]. By utilizing a hybrid beamformer, W C N r × N D S , on the received signal, r d , the final signal after beamforming is written as
y d ( t ) = W H r d ( t ) = W H h d ( t ) s d ( t ) + W H n d ( t ) ,
where s d ( t ) is the transmitted signal at time t and subcarrier d. The average power is p = E { | s d ( t ) | 2 } . h d ( t ) is the N r × 1 mmWave SIMO OFDM channel vector at time t and subcarrier d. W = W R F W B B is a hybrid beamformer. W R F C N r × N R F is an analog combiner and W B B C N R F × N D S is a digital combiner. N R F and N D S denote the number of radio frequency chains and data streams, respectively. n d ( t ) C N r × 1 is the zero-mean additive white Gaussian noise (AWGN) with variance σ n 2 at time t and subcarrier d, i.e., n d ( t ) CN ( 0 , σ n 2 I ) .

3. Identity Authentication Mechanism

3.1. Multipath Time Delay Estimation

By combining the received signals at all subcarriers, we have y = [ y 1 , y 2 , , y D ] . Then the vector form of y can be written as
vec ( y ) = [ Φ B ] α + vec ( n ) = Υ α + vec ( n ) ,
where B = [ W H a 0 ( ϕ 1 , θ 1 ) , , W H a 0 ( ϕ M , θ M ) ] is the effective spatial response matrix after receive beamforming, assuming a narrowband array response. Also, we have n = W H [ n 1 , n 2 , , n D ] , [ Φ ] d , m = e j 2 π f d τ m , and α = s [ α 1 , α 2 , , α M ] T . Υ C N D S D × M is regarded as the space-time response matrix in [19] and characterizes the angles of arrival and multipath time delays. The covariance matrix of vec ( y ) is calculated as
R vec ( y ) = E { vec ( y ) vec ( y ) H } = Υ Ψ α Υ H + σ n 2 I N D S D ,
where Ψ α = E { α α H } is a diagonal matrix. Then, by using the eigenvalue decomposition (EVD) method on R vec ( y ) , R vec ( y ) can be further rewritten as
R vec ( y ) = [ V s , V n ] × Γ s 0 M × ( N D S D M ) 0 ( N D S D M ) × M σ n 2 I N D S D M [ V s , V n ] H = V s Γ s V s H + σ n 2 V n V n H = V s ( Γ s σ n 2 I M ) V s H + σ n 2 I N D S D ,
where V s C N D S D × M and V n C N D S D × ( N D S D M ) denote the signal subspace and noise subspace, respectively. Γ s R M × M is a diagonal matrix.
From (12) and (13), we obtain
V s = Υ T ,
where T C M × M is a full rank matrix.
We define the delay-selection matrix as U E diag ( U E , 1 , U E , 2 , , U E , D ) R D × N D S D , where U E , d = 1 N D S T . Then we obtain the delay-related submatrix Υ E = U E Υ C D × M . We further define U ˜ D , d [ 0 1 × ( d 1 ) , 1 , 0 1 × ( D d ) ] R 1 × D , then the delay-related submatrix associated with the subcarrier frequency f d can be written as Υ E , d = U ˜ E , d Υ E C 1 × M . Therefore, we obtain the relationship between the delay-related submatrices of each subcarrier frequency as
Υ E , d ˜ + 1 = Υ E , d ˜ Ξ E ,
where Ξ E = diag ( e j 2 π Δ F τ 1 , e j 2 π Δ F τ 2 , , e j 2 π Δ F τ M ) C M × M and d ˜ = 1 , 2 , , D 1 .
Based on (14), we can calculate the delay-related submatrix for the subspace matrix at subcarrier frequency f d as
V E , d = U ˜ E , d U E V s = Υ E , d T .
By substituting (15) into (16), we obtain
V E , d ˜ + 1 = V E , d ˜ T 1 Ξ E T = V E , d ˜ Γ E .
Then based on [20], we can estimate Γ ^ E = T 1 Ξ E T = V E , d ˜ V E , d ˜ + 1 , each of which has a total of M eigenvalues, i.e., λ E , d ˜ , m . Therefore, the multipath time delay of the m-th path, τ m , is estimated as
τ ^ m = 1 D 1 d ˜ D 1 j ln ( λ E , d ˜ , m ) 2 π Δ F .
From the estimated multipath time delay, we can calculate the time interval between any two adjacent multipath time delays as
q ^ i ( t ) = τ ^ i + 1 ( t ) τ ^ i ( t ) , i = 1 , 2 , , M 1 .
By considering (6) and (7), the estimations of the two Gaussian random variables q 1 , i and q 2 , i can be generally formulated, respectively, as
q ^ 1 , i ( t ) = q 1 , i ( t ) + w 1 , i ( t ) ,
q ^ 2 , i ( t ) = q 2 , i ( t ) + w 2 , i ( t ) ,
where q 1 , i ( t ) and q 2 , i ( t ) are true values. w 1 , i ( t ) and w 2 , i ( t ) are independent estimation errors that both follow a zero-mean Gaussian distribution with equal variance σ w 2 2 and are uncorrelated with q ^ 1 , i ( t ) and q ^ 2 , i ( t ) , respectively. From (20) and (21), we can easily know that q ^ 1 , i ( t ) and q ^ 2 , i ( t ) are still two independent zero-mean Gaussian random variables with variance σ q 2 + σ w 2 / 2 , i.e., q ^ 1 , i ( t ) , q ^ 2 , i ( t ) N ( 0 , σ q 2 + σ w 2 / 2 ) .
Therefore, the estimation of the time interval between any two adjacent multipath time delays at time t is expressed by
q ^ i ( t ) = ( q ^ 1 , i ( t ) ) 2 + ( q ^ 2 , i ( t ) ) 2 , i = 1 , 2 , , M 1 ,
where the time interval estimation q ^ i ( t ) follows an exponential distribution with parameter λ = 1 2 σ q 2 + σ w 2 , i.e., q ^ i ( t ) exp ( 1 2 σ q 2 + σ w 2 ) .

3.2. Authentication Decision

Based on the estimated multipath time delay values, the authentication decision is formulated as a hypothesis testing problem. In detail, the binary hypothesis testing aims to compare the absolute difference in the estimated multipath time delays at time t and t 1 with a detection threshold. Define Z as
Z i = 1 M 1 | q ^ X , i ( t ) q ^ A , i ( t 1 ) | .
According to the above analysis, we design the binary hypothesis test as
H 0 : Z η , H 1 : Z > η ,
where subscript X and A denote an unknown transmitter (i.e., Alice or Eve) and Alice, respectively. Hypothesis H 0 indicates that the current transmitter is validated as the legitimate transmitter Alice, while hypothesis H 1 indicates that the current transmitter is validated as the illegitimate transmitter Eve. η is a threshold for the designed hypothesis test. The threshold η is a critical system parameter that dictates the practical trade-off between security and usability. Its value represents the sensitivity of the authentication decision. A low threshold makes the system highly sensitive to variations, increasing the probability of detection against an illegitimate user. However, this comes at the cost of increasing the probability of a false alarm, where the legitimate user is incorrectly rejected. A high threshold makes the system more lenient, decreasing the P f but simultaneously reducing the P d , making it easier for an attacker to go undetected. The optimal choice of η is not fixed; it is selected based on the desired operational performance, such as targeting a specific maximum P f (e.g., P f = 0.01 , as used in our analysis in Section 5).
While the choice of η sets the operating point, the performance that can be achieved at that point is directly related to the overall communication environment. Factors like channel conditions and the antenna geometry ( N 1 , N 2 , h , r ) influence the accuracy of the multipath delay estimation. Better channel conditions and a more effective antenna geometry lead to more accurate estimations, which in turn create a larger statistical separation between the H 0 and H 1 hypotheses. This improved separation results in a better Receiver Operating Characteristic curve, allowing the system to achieve a higher P d for any given P f , as will be demonstrated in Section 4 and Section 5.

4. Theoretical Modeling of False Alarm and Detection Probabilities

4.1. False Alarm Probability

A false alarm occurs when the legitimate transmitter is incorrectly identified as the illegitimate transmitter. In the context of our hypothesis test, this corresponds to the event where the test statistic Z exceeds the threshold η , given that hypothesis H 0 is true. To derive the false alarm probability, we define Λ q , H 0 as
Λ q , H 0 q ^ A , i ( t ) q ^ A , i ( t 1 ) .
Substituting (6) and (7) into (25), Λ q , H 0 is obtained as
Λ q , H 0 = q ^ A , i ( t ) q ^ A , i ( t 1 ) = ( q ^ A , 1 , i ( t ) q ^ A , 1 , i ( t 1 ) ) Q 1 × ( q ^ A , 1 , i ( t ) + q ^ A , 1 , i ( t 1 ) ) Q 2 + ( q ^ A , 2 , i ( t ) q ^ A , 2 , i ( t 1 ) ) Q 3 × ( q ^ A , 2 , i ( t ) + q ^ A , 2 , i ( t 1 ) ) Q 4 .
By combining (8) and (20), the random variable Q 1 defined in (26) can be rewritten as
Q 1 = q ^ A , 1 , i ( t ) q ^ A , 1 , i ( t 1 ) = ( ρ 1 ) q A , 1 , i ( t 1 ) + ( 1 ρ 2 ) σ q A 2 u 1 ( t 1 ) + w A , 1 , i ( t ) w A , 1 , i ( t 1 ) .
From (27), because q A , 1 , i ( t 1 ) , u 1 ( t 1 ) , w A , 1 , i ( t ) and w A , 1 , i ( t 1 ) are all zero-mean Gaussian random variables, Q 1 is also a zero-mean Gaussian random variable. Accordingly, we can know that Q 2 , Q 3 and Q 4 are also zero-mean Gaussian random variables. Based on (27), we can derive the variances for Q 1 , Q 2 , Q 3 and Q 4 as
σ Q 1 2 = σ Q 3 2 = 2 σ q A 2 ( 1 ρ ) + σ w 2 ,
σ Q 2 2 = σ Q 4 2 = 2 σ q A 2 ( 1 + ρ ) + σ w 2 .
Let σ H 0 2 = 4 σ q A 4 ( 1 ρ 2 ) + 4 σ q A 2 σ w 2 + σ w 4 . Following the derivation and approximation that Λ q , H 0 follows a Laplace distribution, we have
Λ q , H 0 Laplace ( 0 , σ H 0 2 ) .
Thus, the absolute value of Λ q , H 0 follows an exponential distribution with scale parameter σ H 0 2 :
| Λ q , H 0 | exp 1 σ H 0 2 .
Since Z is the sum of M 1 independent exponentially distributed random variables, it obeys a chi-square distribution with 2 ( M 1 ) degrees of freedom. Therefore, the PDF of Z under H 0 is expressed by
f Z , H 0 ( x ) = 1 2 σ H 0 2 Γ ( M 1 ) x 2 σ H 0 2 M 2 exp x 2 σ H 0 2 , x 0 ,
where Γ ( · ) is the gamma function. Based on (32), the cumulative distribution function (CDF) of Z under H 0 is expressed by
F Z , H 0 ( x ) = 1 exp x 2 σ H 0 2 j = 0 M 2 1 j ! x 2 σ H 0 2 j .
Based on (33), the false alarm probability of our authentication scheme is expressed by
P f = Pr Z > η | H 0 = 1 F Z , H 0 ( η ) = exp η 2 σ H 0 2 j = 0 M = 2 1 j ! η 2 σ H 0 2 j .

4.2. Detection Probability

A detection occurs when the illegitimate transmitter is successfully identified and rejected by the system. This corresponds to the event where the test statistic Z exceeds the threshold η , given that hypothesis H 1 is true. To derive the detection probability, we define Λ q , H 1 as
Λ q , H 1 q ^ E , i ( t ) q ^ A , i ( t 1 ) .
Similar to the derivation in Section 4.1, we let σ H 1 2 = σ q E 2 + σ q A 2 + σ w 2 . We can obtain that | Λ q , H 1 | is approximated by an exponential distribution with scale parameter σ H 1 2 :
| Λ q , H 1 | exp 1 σ H 1 2 .
Therefore, the PDF of Z under H 1 is expressed by
f Z , H 1 ( x ) = = 1 2 σ H 1 2 Γ ( M 1 ) x 2 σ H 1 2 M 2 exp x 2 σ H 1 2 , x 0 ,
Based on (37), the CDF of Z under H 1 is expressed by
F Z , H 1 ( x ) = 1 exp x 2 σ H 1 2 j = 0 M 2 1 j ! x 2 σ H 1 2 j .
Based on (38), the detection probability of our authentication scheme is expressed by
P d = Pr Z > η | H 1 = 1 F Z , H 1 ( η ) = exp η 2 σ H 1 2 j = 0 M 2 1 j ! η 2 σ H 1 2 j .

5. Simulation Results and Analysis

In this section, we conduct a series of numerical simulations to validate our theoretical derivations and evaluate the performance of the proposed PLA mechanism under various conditions. The simulation methodology is designed to model the authentication scenario described in Section 2.1. The time intervals between multipath delays, q A , i , are modeled as exponential random variables, and their evolution between two consecutive frames (at time t 1 and t) is characterized using the first-order Gauss–Markov process. The channel for the illegitimate user, Eve, is generated independently using the same statistical model, but with a different variance for its delay components, as defined by the parameter k q . To generate the performance metrics, we first simulate the reception of an authenticated frame from Alice at t 1 to store the reference fingerprint q ^ A , i ( t 1 ) . Subsequently, we simulate a new frame at time t from an unknown transmitter X.
In the simulations, the system performance is evaluated under varying conditions. The SNR is defined as γ = E s / σ n 2 , where E s denotes the average signal energy per symbol, and σ n 2 represents the variance of the additive white Gaussian noise. Regarding the receiver configuration, the base station Bob employs a hybrid uniform cylindrical array (UCyA) as described in the system model. The specific geometry parameters for the UCyA used in our experiments are set as follows: the number of vertical layers is N 1 , and the number of antennas per circular array is N 2 , resulting in a total of N r receiving antennas. The radius of each circular array is set to r, and the vertical spacing between adjacent layers is h. The variance ratio of multipath delay components is denoted by k q = σ q E 2 / σ q A 2 , and is controlled by fixing σ q A 2 while adjusting σ q E 2 , M represents the number of propagation paths, D is the number of subcarriers, f d is the frequency of each subcarrier, W is the system bandwidth, and ρ represents the autocorrelation coefficient of adjacent multipath delay components. Figure 2 illustrates the ROC curves of the proposed PLA scheme under varying conditions of multipath delay estimation error variance. The experimental setup is fixed with the following parameters: M = 16 , k q = 2 dB , D = 20 , W = 1.6 GHz , and ρ = 0.9 . In the plot, the horizontal axis represents the probability of false alarm ( P f ), and the vertical axis represents the probability of detection ( P d ). Each curve corresponds to a specific value of σ w 2 , namely 0.05, 0.10, 0.15, and 0.20.
We first evaluate the impact of the multipath delay estimation error variance, σ w 2 . This parameter quantifies the accuracy of the feature extraction process itself. A lower σ w 2 signifies a more precise estimation of the channel’s multipath delay features, which serve as the basis for the authentication decision. As this is a crucial parameter for the system’s performance, our first analysis is dedicated to isolating its effect. To clearly demonstrate this, the simulation process for Figure 2 treats σ w 2 as an independent variable. We directly vary its value to model different levels of estimation quality, from “Best Performance” to “Poor Performance”. It is important to note that in a practical, real-world system, σ w 2 would be a dependent variable; its value would be determined by other factors, most notably the SNR of the received signal. This relationship will be explored in the subsequent analysis for Figure 3.
It is clearly observable from the figure that σ w 2 has a direct and significant impact on the performance of the authentication system. A lower value σ w 2 indicates a more accurate estimation of the multipath delay features. As shown in Figure 2, the ROC curve corresponding to the smallest σ w 2 is closest to the top left corner. This signifies that for a given false alarm probability P f , the detection probability P d is maximized; conversely, for a given P d , P f is minimized, which represents the optimal authentication performance. Although the figure directly illustrates the effect of σ w 2 , according to signal processing theory, the estimation error variance σ w 2 is typically inversely proportional to the SNR of the received signal. Consequently, a lower σ w 2 corresponds to a higher SNR, and vice versa. Therefore, the plot also implicitly demonstrates that higher SNR yields better performance.
Figure 3 compares the detection performance of the traditional authentication scheme based on CSI in [21,22] with the authentication proposed based on multipath delay features in this paper, respectively. It illustrates the evolution of P d as a function of the SNR, given a fixed false alarm rate of P f = 0.01 . As anticipated, the detection performance for both mechanisms improves monotonically with increasing SNR. This trend validates the theoretical expectation that higher signal quality minimizes noise interference, thereby enabling more accurate channel estimation and enhancing the distinctiveness of legitimate users. Notably, the proposed Scheme 1 (Multipath Time Delay) demonstrates superior robustness in low-SNR regimes compared to Scheme 2 (Traditional CSI). As shown in the plot, between −10 dB and 5 dB, Scheme 1 maintains a significant performance lead. For instance, at 0 dB, the multipath-based scheme achieves a P d of approximately 0.55, whereas the traditional CSI scheme reaches only 0.28. This advantage is attributed to the fine-grained nature of multipath delay features, specifically their differential and time-evolutionary characteristics, which are less sensitive to noise than the macroscopic holistic CSI correlations. Conversely, in high-SNR conditions (>10 dB), the performance of both methods converges and saturates near unity ( P d 1 ), implying that both methods can effectively identify illegitimate users when the SNR is sufficiently high. This indicates that while traditional CSI is effective when signal quality is pristine, the proposed multipath delay approach offers a critical advantage in challenging, noise-limited environments.
To further evaluate the robustness of the proposed methodology, we investigated the impact of key system variables on the authentication performance. First, regarding the correlation coefficient ρ , which models the temporal stability of the channel, our analysis indicates that a higher ρ significantly improves performance. As ρ approaches 1, the legitimate channel becomes more correlated over time, reducing the variance of the test statistic Z under hypothesis H 0 . Consequently, this lowers the False Alarm Probability ( P f ) for a fixed threshold. Second, the system bandwidth W plays a critical role in the resolution of multipath delay estimation. An increase in bandwidth results in finer time-domain resolution. This enhanced resolution reduces the estimation error variance σ w 2 , thereby shifting the ROC curves toward the optimal upper-left corner. However, it is worth noting that increasing bandwidth imposes higher requirements on the hardware sampling rate and processing complexity. Third, the number of multipath components M contributes to the diversity of the fingerprint. As M increases, the degrees of freedom in the chi-square distribution of the test statistic increase. Theoretical analysis suggests that a larger M provides more distinctive features, improving the distinguishability between the legitimate user and the spoofer, provided that the additional paths can be accurately estimated. Moreover, in our proposed scheme, the antenna geometry indirectly, yet critically, influences the ROC curves through the channel estimation accuracy. The delay estimation algorithm relies on the effective SNR after beamforming. Specifically, the total number of antenna elements N r = N 1 × N 2 determines the array gain. A larger array provides higher array gain, which effectively suppresses the noise variance σ n 2 in the signal subspace. Therefore, while the geometric parameters ( h , r ) primarily determine the manifold structure for the Angle of Arrival resolution, the quantity of antennas is the dominant geometric factor enhancing the multipath delay authentication performance by minimizing estimation errors.

6. Conclusions

This paper addresses the issue of identity spoofing attacks in mmWave SIMO systems by proposing a PLA mechanism based on multipath delay fingerprint features. By constructing a channel model, designing an efficient feature extraction method, and establishing an authentication framework founded on hypothesis testing theory, the proposed scheme achieves effective differentiation between legitimate and spoofing devices. Furthermore, theoretical expressions for the false alarm rate and detection rate are derived to characterize the authentication performance. The efficacy of the scheme is systematically evaluated through simulations under various SNR and channel estimation error conditions. The results demonstrate that the proposed solution exhibits strong robustness and practicality while maintaining low communication overhead, thereby significantly enhancing the security of mmWave SIMO communication systems.
While the proposed scheme demonstrates strong robustness, it is important to discuss its limitations. Firstly, as noted in Section 2.1, our methodology assumes the absence of signal collisions, where the receiver discards collided frames. Developing a mechanism to authenticate reliably in the presence of such spoofing-by-collision attacks remains a significant challenge. Secondly, regarding mobility, our current work models the channel variation between two consecutive frames using a first-order Gauss–Markov process. This is effective for low-to-moderate mobility scenarios. However, in high-mobility environments, the channel may decorrelate significantly within a single transmission frame, not just between frames. This rapid intra-frame variation could degrade the accuracy of the channel feature estimation and subsequently increase the false alarm rate, as the reference fingerprint stored at time t 1 would become rapidly outdated. Analyzing and mitigating the impact of such high-speed movement is a critical limitation of the current study.
Future research will proceed in several directions to address these limitations. Firstly, we will investigate authentication mechanisms robust to signal collisions. Secondly, we will explicitly analyze the impact of high-mobility scenarios and develop more adaptive online mechanisms that can track rapid intra-frame channel variations, potentially by shortening the observation window or employing predictive tracking filters. Finally, we will explore multi-modal authentication that integrates diverse physical layer features to improve the overall identification accuracy.

Author Contributions

Formal analysis, W.W.; Investigation, Y.S.; Data curation, C.L.; Writing—original draft, W.W.; Writing—review & editing, P.Z. and Y.Z. All authors have read and agreed to the published version of the manuscript.

Funding

This research was funded in part by the QinChuangyuan Innovation and Entrepreneurship Talent Project of Shaanxi under Grant QCYRCXM-2022-144, in part by the Fund of National Key Laboratory of Electromagnetic Space Security, in part by the National Key R&D Program of China under grant 2023YFB3107500, National Natural Science Foundation of China (62272241), Natural Science Foundation of Jiangsu Province (BK20251877), in part by the National Natural Science Foundation of China under Grant 62202354 and Grant 92267204, in part by the Key Research and Development Program of Shaanxi Province under Grant 2024GX-YBXM-073, in part by the Fundamental Research Funds for the Central Universities under Grant QTZX25080.

Data Availability Statement

Data are contained within the article.

Conflicts of Interest

The authors declare no conflicts of interest.

References

  1. Yang, N.J.; Wang, L.; Geraci, G.; Elkashlan, M.; Yuan, J.; Renzo, M.D. Safeguarding 5G wireless communication networks using physical layer security. IEEE Commun. Mag. 2015, 53, 20–27. [Google Scholar] [CrossRef]
  2. Lin, J.; Yu, W.; Zhang, N.; Yang, X.; Zhang, H.; Zhao, W. A Survey on Internet of Things: Architecture, Enabling Technologies, Security and Privacy, and Applications. IEEE Internet Things J. 2017, 4, 1125–1142. [Google Scholar] [CrossRef]
  3. Wang, X.; Hao, P.; Hanzo, L. Physical-layer authentication for wireless security enhancement: Current challenges and future developments. IEEE Commun. Mag. 2016, 54, 152–158. [Google Scholar] [CrossRef]
  4. Xie, N.; Chen, J.; Huang, L. Physical-Layer Authentication Using Multiple Channel-Based Features. IEEE Trans. Inf. Forensics Secur. 2021, 16, 2356–2366. [Google Scholar] [CrossRef]
  5. Xiao, L.; Greenstein, L.J.; Mandayam, N.B.; Trappe, W. Channel-based spoofing detection in frequency-selective rayleigh channels. IEEE Trans. Wirel. Commun. 2009, 8, 5948–5956. [Google Scholar] [CrossRef]
  6. Xiao, L.; Wan, X.; Han, Z. PHY-Layer Authentication with Multiple Landmarks with Reduced Overhead. IEEE Trans. Wirel. Commun. 2018, 17, 1676–1687. [Google Scholar] [CrossRef]
  7. Wang, N.; Li, W.; Wang, P.; Alipour-Fanid, A.; Jiao, L.; Zeng, K. Physical Layer Authentication for 5G Communications: Opportunities and Road Ahead. IEEE Netw. 2020, 34, 198–204. [Google Scholar] [CrossRef]
  8. Hou, W.; Wang, X.; Chouinard, J.; Refaey, A. Physical Layer Authentication for Mobile Systems with Time-Varying Carrier Frequency Offsets. IEEE Trans. Commun. 2014, 62, 1658–1667. [Google Scholar] [CrossRef]
  9. Tang, J.; Xu, A.; Jiang, Y.; Zhang, Y.; Wen, H.; Zhang, T. MmWave MIMO Physical layer Authentication by Using Channel Sparsity. In Proceedings of the 2020 IEEE International Conference on Artificial Intelligence and Information Systems (ICAIIS), Dalian, China, 20–22 March 2020; pp. 221–224. [Google Scholar] [CrossRef]
  10. Liu, F.J.; Wang, X. Physical Layer Authentication Enhancement Using Two-Dimensional Channel Quantization. IEEE Trans. Wirel. Commun. 2016, 15, 4171–4182. [Google Scholar] [CrossRef]
  11. Lin, Z.; Lv, T.; Ni, W.; Zhang, J.A.; Zeng, J.; Liu, R.P. Joint Estimation of Multipath Angles and Delays for Millimeter-Wave Cylindrical Arrays with Hybrid Front-Ends. IEEE Trans. Wirel. Commun. 2021, 20, 4631–4645. [Google Scholar] [CrossRef]
  12. Saleh, A.A.M.; Valenzuela, R.A. A Statistical Model for Indoor Multipath Propagation. IEEE J. Sel. Areas Commun. 1987, 5, 128–137. [Google Scholar] [CrossRef]
  13. Mallik, R.K. On multivariate Rayleigh and exponential distributions. IEEE Trans. Inf. Theory 2003, 49, 1499–1515. [Google Scholar] [CrossRef]
  14. Zhang, P.; Shen, Y.; Jiang, X.; Wu, B. Physical Layer Authentication Jointly Utilizing Channel and Phase Noise in MIMO Systems. IEEE Trans. Commun. 2020, 68, 2446–2458. [Google Scholar] [CrossRef]
  15. Zhang, P.; Liu, J.; Shen, Y.; Jiang, X. Exploiting Channel Gain and Phase Noise for PHY-Layer Authentication in Massive MIMO Systems. IEEE Trans. Inf. Forensics Secur. 2021, 16, 4265–4279. [Google Scholar] [CrossRef]
  16. Xie, N.; Zhang, S. Blind Authentication at the Physical Layer Under Time-Varying Fading Channels. IEEE J. Sel. Areas Commun. 2018, 36, 1465–1479. [Google Scholar] [CrossRef]
  17. Xie, N.; Chen, C. Slope Authentication at the Physical Layer. IEEE Trans. Inf. Forensics Secur. 2018, 13, 1579–1594. [Google Scholar] [CrossRef]
  18. Gao, X.; Dai, L.; Han, S.; I, C.; Heath, R.W., Jr. Energy-Efficient Hybrid Analog and Digital Precoding for MmWave MIMO Systems With Large Antenna Arrays. IEEE J. Sel. Areas Commun. 2016, 34, 998–1009. [Google Scholar] [CrossRef]
  19. Vanderveen, M.C.; van der Veen, A.; Paulraj, A. Estimation of multipath parameters in wireless communications. IEEE Trans. Signal Process. 1998, 46, 682–690. [Google Scholar] [CrossRef]
  20. Schmidt, R. Multiple emitter location and signal parameter estimation. IEEE Trans. Antennas Propag. 1986, 34, 276–280. [Google Scholar] [CrossRef]
  21. Tang, J.; Wen, H.; Zeng, K.; Liao, R.f.; Pan, F.; Hu, L. Light-Weight Physical Layer Enhanced Security Schemes for 5G Wireless Networks. IEEE Netw. 2019, 33, 126–133. [Google Scholar] [CrossRef]
  22. Liao, R.F.; Wen, H.; Wu, J.; Pan, F.; Xu, A.; Song, H.; Xie, F.; Jiang, Y.; Cao, M. Security Enhancement for Mobile Edge Computing Through Physical Layer Authentication. IEEE Access 2019, 7, 116390–116401. [Google Scholar] [CrossRef]
Figure 1. System model.
Figure 1. System model.
Electronics 14 04682 g001
Figure 2. ROC curve under different estimation errors.
Figure 2. ROC curve under different estimation errors.
Electronics 14 04682 g002
Figure 3. Comparison of authentication mechanism.
Figure 3. Comparison of authentication mechanism.
Electronics 14 04682 g003
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Wang, W.; Liang, C.; Shen, Y.; Zhang, P.; Zhang, Y. Physical Layer Authentication Exploiting Multipath Delay Fingerprints in Millimeter-Wave Communication Systems. Electronics 2025, 14, 4682. https://doi.org/10.3390/electronics14234682

AMA Style

Wang W, Liang C, Shen Y, Zhang P, Zhang Y. Physical Layer Authentication Exploiting Multipath Delay Fingerprints in Millimeter-Wave Communication Systems. Electronics. 2025; 14(23):4682. https://doi.org/10.3390/electronics14234682

Chicago/Turabian Style

Wang, Wei, Cheng Liang, Yuanzhang Shen, Pinchang Zhang, and Yuanyu Zhang. 2025. "Physical Layer Authentication Exploiting Multipath Delay Fingerprints in Millimeter-Wave Communication Systems" Electronics 14, no. 23: 4682. https://doi.org/10.3390/electronics14234682

APA Style

Wang, W., Liang, C., Shen, Y., Zhang, P., & Zhang, Y. (2025). Physical Layer Authentication Exploiting Multipath Delay Fingerprints in Millimeter-Wave Communication Systems. Electronics, 14(23), 4682. https://doi.org/10.3390/electronics14234682

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop