Next Article in Journal / Special Issue
A Quantum-Resistant Identity Authentication and Key Agreement Scheme for UAV Networks Based on Kyber Algorithm
Previous Article in Journal
MobileAmcT: A Lightweight Mobile Automatic Modulation Classification Transformer in Drone Communication Systems
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Exploiting Cascaded Channel Signature for PHY-Layer Authentication in RIS-Enabled UAV Communication Systems

1
School of Communications and Information Engineering, Nanjing University of Posts and Telecommunications, Nanjing 210023, China
2
Portland Institute, Nanjing University of Posts and Telecommunications, Nanjing 210023, China
3
School of Computer Science, Nanjing University of Posts and Telecommunications, Nanjing 210023, China
4
School of Computer Science, Xidian University, Xi’an 710071, China
*
Author to whom correspondence should be addressed.
These authors contributed equally to this work.
Drones 2024, 8(8), 358; https://doi.org/10.3390/drones8080358
Submission received: 4 June 2024 / Revised: 26 July 2024 / Accepted: 26 July 2024 / Published: 30 July 2024
(This article belongs to the Special Issue Physical-Layer Security in Drone Communications)

Abstract

Reconfigurable Intelligent Surface (RIS)-assisted Unmanned Aerial Vehicle (UAV) communications face a critical security threat from impersonation attacks, where adversaries impersonate legitimate entities to infiltrate networks to obtain private data or unauthorized access. To combat such security threats, this paper proposes a novel physical layer (PHY-layer) authentication scheme for validating UAV identity in RIS-enabled UAV wireless networks. Considering that most existing works focus on traditional communication systems such as IoT and millimeter wave multiple-input multiple-output (MIMO) systems, there is currently no mature PHY-layer authentication scheme to serve RIS-UAV communication systems. To this end, our scheme leverages the unique characteristics of cascaded channels related to RIS to verify the legitimacy of UAV transmitting signals to the base station (BS). To be more precise, we first use the least squares estimate method and coordinate a descent-based algorithm to extract the cascaded channel feature. Next, we explore a quantizer to quantize the fluctuations of the channel gain that are related to the extracted channel feature. The 1-bit quantizer’s output findings are exploited to generate the authentication decision criteria, which are then tested using a binary hypothesis. The statistical signal processing technique is utilized to obtain the analytical formulations for detection and false alarm probabilities. We also conduct a computational complexity analysis of the proposed scheme. Finally, the numerical results validate the effectiveness of the proposed performance metric models and show that our detection performance can reach over 90% accuracy at a low signal-to-noise ratio (e.g., −8 dB), with a 10% improvement in detection accuracy compared with existing schemes.

1. Introduction

1.1. Background

The introduction of reconfigurable intelligent surfaces (RISs) is highly important for enhancing the performance of wireless communication systems, which provides significant benefits, such as extensive coverage, boosting capacity, and spectral efficiency enhancement [1,2]. Moreover, RIS is compatible with one or more of the most common standards and hardware architectures in existing wireless networks [3] and is easily deployed into wireless communication environments, making it extremely important for sixth generation (6G) wireless communications in the future [4,5]. RIS, serving as a promising technology, can be incorporated into the infrastructure of wireless communications to enhance connectivity for various applications, including smart grids, autonomous vehicles, the Internet of Things (IoT), etc. [6]. The emergence of UAV networks acting as aerial wireless relays for transferring information is becoming a feasible and cost-effective solution to enhance energy efficiency and provide additional capacity [7]. On the one hand, owing to their flexibility, maneuverability, and low manufacturing cost, UAVs provide traditional wireless communication with broader communication coverage and potentially overcome propagation constraints due to terrain characteristics, especially applicable in rural or disaster areas lacking adequate ground infrastructure [8]. On the other hand, UAVs are usually deployed at high altitudes. This results in a more dominant line-of-sight (LoS) channel with the ground nodes, which can be exploited to provide more reliable communication links compared with terrestrial wireless channels that generally suffer from severe path loss [9,10]. Hence, based on the advantages of the UAVs mentioned above, the integration of RIS with unmanned aerial vehicle (UAV) communication systems presents a promising avenue for enhancing the performance and capabilities of systems. We also note that the strategic placement of RIS in RIS-UAV systems is pivotal for optimizing performance by providing focused signal enhancement, which is crucial for maintaining a stable and high-quality link in the dynamic aerial environment [11,12]. By intelligently reflecting signals towards the UAV, RIS can mitigate signal attenuation and blockages caused by the terrain or other obstacles, ensuring a more consistent and reliable communication link even as the UAV navigates through varied landscapes. Consequently, the RIS-enabled UAV communication system leads to an extended coverage area and less movement of UAVs and improves communication performance in wireless networks. However, incorporating RIS into UAV communication systems also introduces new security considerations, such as impersonation attacks.
Ensuring authentication is crucial for validating the legitimacy of the source of transmitted signals in secure RIS-enabled UAV wireless networks [13,14]. For RIS-enabled wireless networks, the provision of a trustworthy and adaptable transmitter identity is becoming a pressing need. First, because of the open nature of the transmission media, RIS-enabled UAV communication systems are very vulnerable to impersonation attacks. Second, numerous heterogeneous wireless devices join in or leave wireless networks randomly, leading to high demands on the security and confidentiality of RIS-enabled communication systems. Therefore, it is significantly crucial to design a robust and effective authentication scheme to guarantee the secure operation of the considered RIS-UAV networks.

1.2. Related Work

The implementation of physical layer (PHY-layer) authentication offers a cost-effective approach to bolster and supplement traditional higher-layer authentication, and has garnered significant interest. The main methods of PHY-layer authentication are broadly divided into two categories: (1) radio frequency (RF) fingerprinting-based authentication and (2) channel fingerprinting-based authentication. RF fingerprinting-based approaches authenticate the legitimacy of the device identity by exploiting hardware features hidden in transmitted signals. In [15], the authors introduce a novel Radio Frequency Fingerprinting Identification (RFFI) protocol that leverages the unique and intrinsic hardware impairments of devices, such as oscillator imperfections, in-phase and quadrature (IQ) imbalances, and power amplifier (PA) nonlinearities, for device authentication in the Internet of Things. Utilizing signal-to-noise ratio (SNR) trace features, an effective PHY-layer authentication method is designed to detect impersonation attacks in millimeter wave (mmWave) communication systems [16]. In [17], it is proved that polarization fingerprints (PF) offer high identification accuracy and robustness against typical attacks by leveraging the unique spatial and frequency characteristics of wireless signals in the polarization domain. Extensive experiment results are provided to show the overall identification and authentication accuracy approach at 99 % . In [18], a new beam fingerprinting referred to as SNR trace is exploited to resist the spoofing attack, and verification accuracy can reach 99% even for 200 training samples. It is important to note that RF fingerprinting-based authentication carries a greater computational complexity and always necessitates the employment of high-precision hardware equipment for hardware feature extraction.
Channel fingerprinting-based authentication primarily leverages the spatial variability of uncorrelated wireless channels across distinct geographical areas [19]. The authors in [20] exploit multi-path delay characteristics extracted from channel impulse response to develop an authentication scheme based on a two-dimensional quantization algorithm. In [21], the researchers examine the channel gain specific to the location and the phase noise specific to the transmitter, aiming to establish a framework for leveraging various PHY-layer attributes for authentication purposes. Following this line, the authors in [22] explore the use of multi-channel features to design a PHY-layer authentication scheme and also examine the performance loss caused by quantization errors caused by quantizers. A ResNet-based deep learning approach is introduced in [23] for physical layer authentication in the industrial Internet of Things (IIoT), demonstrating superior accuracy and robust performance through channel state information feature extraction and advanced training strategies, culminating in a 99.64% authentication accuracy that outperforms existing methods by 32.68%. In [24], the authors attempt to utilize a sparse mmWave channel for authenticating devices. Utilizing channel polarization response, a robust authentication technique for physical layer security is introduced in [25] to ensure high authentication accuracy across diverse scattering conditions and in low SNR environments through the distinctive polarization signatures of hardware devices. The existing methods above show that the uniqueness reflected by the channel enables it to be used as a device identity fingerprint to resist impersonation attacks. For a communication system, a channel is generally required to accurately estimate for ensuring the quality of service of message transmission in advance. Channel-based authentication can almost be conducted in an arbitrary communication system without additional feature extraction operations, and thus keeps lower signal processing cost and overhead. We also observe that schemes based on hardware impairments might not be able to authenticate transmitters because hardware feature extraction is difficult under strict error tolerance limitations and the extensive usage of passive components using an identical reflecting architecture. Therefore, we focus on the channel fingerprint-based authentication in this paper. Table 1 summarizes the related works and their adopted feature parameters and the application scenario.
Efficient channel feature extraction methods are vital for the channel-based authentication scheme. In recent years, the use of tensor decomposition technology for high-mobility channel estimation has attracted extensive attention. In [27], Wu et al. propose a low-complexity channel estimation algorithm based on a tensor, which is specially used for millimeter-wave large-scale MIMO-OTFS systems. This method takes advantage of the sparsity of the channel in the delay-Doppler-angle domain, and transforms the channel estimation problem into a sparse signal recovery problem by designing a new pilot structure. Zhang et al. propose a unified tensor method in [28] for channel and target parameter estimation in large-scale MIMO-ISAC systems. By parameterizing the high-dimensional communication channel, this method associates the channel state information with the angle, delay, and Doppler parameters of the target, and proposes a shared training mode, which makes the channel estimation and target parameter estimation unified into a tensor decomposition problem, and significantly improves the estimation accuracy and training overhead efficiency. Despite their excellent estimation performance, these methods mainly focus on the mmWave MIMO channel rather than the RIS-UAV scenario. Hence, it is imperative to design a feasible cascaded channel estimation technique for the RIS-UAV system.

1.3. Motivation and Contribution

Although current channel fingerprint-based authentication solutions mark a significant advancement in the design of PHY-layer authentication approaches, they typically detect the correction between the current channel associated with the transmitter and the previous channel validated as being associated with the legitimate transmitter in order to determine the legitimacy of an identity. These methods cannot be directly applied to wireless communication systems with RIS assistance because of the complexity and dynamic nature of the cascaded channels. In addition, the partial visibility of RIS’s effect on the data implies that the overall structure of the channel becomes indeterminate when considering RIS. It becomes exceedingly challenging to identify the specific components of the channel that are influenced by RIS. Moreover, the presence of a substantial number of passive RIS elements may complicate the acquisition of channel state information.
Some works have been devoted to the estimation of cascaded (also named composite) channels for RIS-enabled wireless communication systems. The authors in [29] investigate a passive frequency-guided channel estimation method, which can effectively reduce the pilot overhead. In [30], a minimum mean squared error-discrete Fourier transform-based channel estimation protocol is designed to separately estimate two-stage cascaded channels. A channel estimation framework referred to as two-stage RIS-enabled channel estimation is provided for RIS mmWave communication systems, which has a comparatively low training overhead and computational complexity [31]. In view of the severe threat of eavesdropping and/or impersonation attacks on RIS-enabled wireless communication systems, many methods have been proposed for secret key generation and secure transmission based on a PHY-layer security technique. The authors in [32] examine secret key generation using RIS-enabled wireless communication networks and the minimum achievable secret key capacity using a RIS beamformer in the presence of multiple eavesdroppers and solve an optimization problem on reflecting coefficients with the secret key capacity’s lower bound. Further, they also exhibit an encrypted data transmission scheme utilizing RIS to generate secret keys and provide the method for maximizing the secure transmission rate [33].
To the best of our knowledge, the issue of verifying transmitter identity in RIS-enabled UAV networks needs to be explored to ensure security. Based on the above research works, this paper attempts to develop an effective PHY-layer authentication method, considering the complexity brought by the cascade channels for RIS-enabled UAV wireless communication systems. Our proposed approach differs from previous channel-based approaches in that it uses RIS-related cascaded/composite channel fingerprinting to jointly authenticate transmitter identity and thwart impersonation attacks. Previous approaches conducted authentication based on a single-channel coefficient similarity. Additionally, the analytic expressions of statistical performances are provided for the RIS-related cascaded/composite channel-based authentication scheme in RIS-enabled UAV communication systems.
The main contributions are as follows:
  • By leveraging the location-specific cascaded channel features’ user equipment (UE) RIS and RIS base station (BS), we propose a novel physical layer authentication scheme for RIS-enabled UAV wireless communication systems.
  • Using the first-order Gauss–Markov process, we model the time-varying complicated cascaded channels involved in RIS. With the help of the coordinated descent-based estimation algorithm and least squares estimation algorithm, we fulfill the estimation of time-varying complicated cascaded channels.
  • Based on a 1-bit quantizer, we exploit the extracted channel features to establish authentication verification under the framework of the hypothesis testing framework. The performance of our proposed authentication scheme is analytically evaluated by deriving the typical performance metrics, including false alarm and detection probabilities, and establishing the statistical performance analytically.
  • Through extensive simulations, we verify the correctness of the theoretical models of the two probabilities. Simulation results further show how the system parameters can affect the statistical authentication performance.
The remainder of this paper is structured as follows: Section 2 provides a detailed introduction to the system model and problem formulation. The proposed PHY-layer authentication scheme is outlined in Section 3. In Section 4, the modeling of false alarm and detection probabilities is presented. Section 5 contains the numerical results. Lastly, Section 6 wraps up this paper. Important symbols are summarized in Table 2.

2. System Model and Problem Formulation

In Figure 1, a RIS-enabled UAV wireless communication system is depicted, featuring a base station (Bob) with M antennas, a legitimate single-antenna UAV user equipment (UE, named Alice), a RIS with N reflecting elements, and a single-antenna attacker (Eve). The BS is assumed to operate in full-duplex mode, and uses the BS-RIS channel estimation method described in [34]. In this setup, UAV Alice transmits signals to the intended recipient, Bob, who needs to differentiate between legitimate and illegitimate data frames at time k. Meanwhile, Eve seeks to transmit maliciously modified data frames or inject aggressive signals by posing as Alice. Since the focus of this paper is on implementing the UAV identity authentication for RIS-UAV systems, the optimal placement determination of RIS can refer to [13,14] for more details.
In line with the assumption in previous works [35,36], our primary focus is on exploring the potential of RIS technology for authentication in scenarios where a direct link between the BS and UE is obstructed or unreliable. This could be due to factors like dense urban environments, indoor deployments, or non-line-of-sight communication. By excluding direct links, we can more accurately evaluate the impact of RIS deployment on system performance without interference from traditional direct-link communication channels.
The secure transmission of confidential information, such as the authentication scheme used by Alice and Bob, presents significant challenges for unauthorized parties like Eve. Nevertheless, through the analysis of transmitted signals from Alice, Eve can gain access to certain commonly repurposed information, such as pilot symbols and training sequences, owing to the inherent broadcast nature of the communication medium.
This study suggests a straightforward and adaptable physical layer authentication technique to enable Bob, the receiver, to easily determine the current signal’s source. For the two consecutive data frames, we assume that the first, received by Bob at time k 1 , was validated by Alice by exploiting a cryptographic authentication scheme at the upper application layer and Bob measured and stored the cascaded channel parameters as authentication fingerprinting for subsequent certification. When receiving the second data frame at time k, the aim of Bob is to determine whether the current data frame is still from Alice based on the stored cascaded channel fingerprinting. The detailed authentication process is also illustrated in Figure 2.
The messages are exchanged between the communicating devices via the channels for BS-RIS and RIS-UAV (Alice/Eve). Similar to the work in [37], if we use RIS to reflect a signal in the direction θ , then the path loss P L at the distance r is expressed by
P L = G t G r ( 4 π ) 2 s d r 2 cos 2 ( θ ) ,
where G t and G r denote the antenna gain at the transceiver end. s denotes the size of RIS, and d is the distance between the signal source and RIS. Let f ( k ) = [ f 1 ( k ) , , f N ( k ) ] T C N × 1 denote the RIS-UAV channel with f i ( k ) being the ith channel component, and all channel components are independent and identically distributed complex Gaussian random variables with zero mean and variance σ f 2 . Then, we have f ( k ) CN 0 , σ f 2 I N . Denote G ( k ) C M × N as the channel for BS-RIS and the channel component is i.i.d. Then the vectorization of the matrix G ( k ) is written as vec G ( k ) CN 0 , σ G 2 I M N . Let ϕ = [ ϕ 1 , , ϕ N ] T C N × 1 be the coefficient of the reflecting elements on RIS. Moreover, the hardware limitations of RIS make the phases at RIS elements controlled by quantization, i.e., ϕ i 1 , + 1 , for i = 1 , 2 , , N . The reflection coefficient is known to us. The received signal y ( k ) C M × 1 at BS is written as
y ( k ) = G ( k ) ϕ f ( k ) · x ( k ) + n ( k ) ,
where x ( k ) is the transmitted symbol from UAV (e.g., Alice) and n ( k ) C M × 1 is the additive white noise, i.e., n ( k ) CN 0 , σ n 2 I M . The equivalent cascaded channel (i.e, BS-RIS-UAV channel) is given by the following equation:
H ( k ) G ( k ) diag f ( k ) .
From (3), one can see that the cascaded channel matrix H ( k ) C M × N is a complex Gaussian random variable conditioned on a given G ( k ) .
Due to the mobility of the user, the channels are spatially uncorrelated and changing continuously in time (i.e., time-varying). Temporal channel variations are caused by the Doppler rate. Let f d be the normalized maximum Doppler frequency. Then, we have a relationship between f d and the mobile speed of UAV v as f d = v f c c T s . f c , c, and T s denote carrier frequency, speed of light, and sampling interval, respectively. Using the Jakes model [38], the temporal variation of f ( k ) for an arbitrary time k s is given by
Ψ ( k s ) = E { f ( k ) f * ( k + k s ) } = J 0 ( 2 π f d k s ) σ f 2 I N ,
where J 0 ( · ) is a zero-order Bessel function of the first kind. A first-order Gauss–Markov process is used to describe the fluctuation of channels [21]. Applying [21], the correlation coefficient of f ( k ) is computed as 1 σ f 2 Ψ ( k s ) I N . Thus, f ( k ) is expressed by
f ( k ) = α f ( k 1 ) + 1 α 2 v ( k ) ,
where α denotes the correlation coefficient for the UAV (Alice /Eve)-RIS channel and v ( k ) C N × 1 CN 0 , σ f 2 I N is independent of f ( k ) .
It is worth noting that when both RIS and BS are geographically deployed in fixed locations and scatterers and reflectors in the environments do not quickly change, the channel for BS-RIS can be regarded as a constant during the two successive times k 1 and k as follows:
G k 1 = G k = G .
By using the Gauss–Markov model, the time-varying cascaded channel H ( k ) relevant to UAV (Alice /Eve) is given by
H ( k ) = α H ( k 1 ) + 1 α 2 G diag ( v ( k 1 ) ) = α G diag ( f ( k 1 ) ) + 1 α 2 G diag ( v ( k ) ) .
Since there is always inevitable noise and/or interference, the estimated value of the cascaded channel is expressed as the sum of the true value of the channel and the estimation error, as follows:
H ^ k = H k + W k ,
where vec W k C M N × 1 CN 0 , σ w 2 I M N .

3. Proposed PHY-Layer Authentication Scheme

3.1. Estimation of the Cascaded Channel

Because of the fixed positions of RIS and BS, the BS-RIS channel G is generally regarded as quasi-static, meaning that its value does not change over time. As such, it can be estimated once on a large timescale, and the estimated value is expressed as the channel value during this time. However, this research takes the stance that since UAV UEs are movable, the channel RIS-UAV varies over time. It is essential to estimate the channel on a smaller timescale, that is, in a brief time interval, in order to produce a more accurate channel estimation of the channel RIS-UAV.
Since RIS is assumed to have only passive reflecting elements in this paper, it can neither transmit nor receive pilots, making it difficult to estimate the channel with conventional methods. Fortunately, a dual-link pilot transmission method can overcome this difficult problem. Based on [34], the BS works at full-duplex mode to facilitate the estimation of the BS-RIS channel. Since there may be severe self-interference in the full-duplex system, we use self-interference mitigation techniques [39] to reduce the impact of self-interference. Specific implementation details can be found in [34].
To estimate the BS-RIS channel, the dual-link pilot transmission approach [34] is employed in this study. Next, a least squares estimation technique using the traditional pilot transmission strategy is developed to achieve the estimate of RIS-UAV because of the low dimensionality of the RIS-UAV channel. The cascaded channel estimation framework is illustrated in Figure 3.
In an attempt to simplify the computation, here, we consider one single-antenna UAV UE, and thus, Equation (2) can be equivalently expressed in a compact form (the time index is omitted here for convenient notation) as
y = G ( ϕ f ) · x + n = H ϕ · x + n .
Equation (3) can be rewritten (the time index is omitted here for convenient notation) as
H = G p 1 p N × p 1 1 p N 1 diag f = G diag f ,
where p i C is non-zero, G = G diag p C M × N , p p 1 , p 2 , , p N T C N × 1 , and f = f p C N × 1 .
In the transmission scheme, a pilot frame consisting of N + 1 subframes is considered. A subframe includes L time slots. BS transmits a non-zero pilot signal in the t-th subframe t = 1 , 2 , , N + 1 s m 1 , t with the m 1 -th antenna (the rest of the BS antennas transmit zeros) through the downlink to RIS, which then returns the pilot signal to BS with the corresponding reflection coefficient vector ϕ ¯ t C N × 1 . The signal at the m 2 -th antenna for BS is then expressed by
y m 1 , m 2 , t d = g m 2 T diag ϕ ¯ t g m 1 + e m 1 , m 2 s m 1 , t + q ¯ m 1 , m 2 , t + n ¯ m 1 , m 2 , t = g m 1 g m 2 T ϕ ¯ t + e m 1 , m 2 s m 1 , t + q ¯ m 1 , m 2 , t + n ¯ m 1 , m 2 , t , m 2 = 1 , 2 , , M , m 2 m 1 ,
where m 1 and m 2 denote the m 1 -th antenna (i.e., transmitting pilot signal) and the m 2 -th BS antenna (i.e., receiving pilot signal), respectively. g m 2 T G m 2 , : C 1 × N , g m 1 G m 1 , : T C N × 1 , and q ¯ m 1 , m 2 , t denotes the interference. Let e m 1 , m 2 and n ¯ m 1 , m 2 , t denote the propagation noise and the receiving noise at the m 2 -th BS antenna, respectively. We consider n ¯ m 1 , m 2 , t CN 0 , σ n 2 .
After receiving the signals from the m 1 -th transmitting antenna and the m 2 -th receiving antenna across all N + 1 subframes, we write (11) in vector form given by
y d m 1 , m 2 T = g m 1 g m 2 T ϕ ¯ 1 , ϕ ¯ 2 , , ϕ ¯ N + 1 + e m 1 , m 2 1 1 × ( N + 1 ) × P B S + q ¯ m 1 , m 2 T + n ¯ m 1 , m 2 T = P B S u m 1 , m 2 T 1 1 × ( N + 1 ) ϕ ¯ + q ¯ m 1 , m 2 T + n ¯ m 1 , m 2 T ,
where ϕ ¯ = [ ϕ ¯ 1 , ϕ ¯ 2 , , ϕ ¯ N + 1 ] C N × ( N + 1 ) , u m 1 , m 2 [ e m 1 , m 2 , ( g m 1 g m 2 ) T ] T C ( 1 + N ) × 1 , and we assume that P B S represents the pilot signal without loss of generality (i.e., s m 1 , t = P B S ). P B S is the signal power. q ¯ m 1 , m 2 = [ q m 1 , m 2 , 1 , q m 1 , m 2 , 2 , , q m 1 , m 2 , N + 1 ] T C ( 1 + N ) × 1 , n ¯ m 1 , m 2 = [ n m 1 , m 2 , 1 , n m 1 , m 2 , 2 , , n m 1 , m 2 , N + 1 ] T C ( 1 + N ) × 1 . From (12), the estimation of u m 1 , m 2 T denoted by u ^ m 1 , m 2 T can be easily achieved by
u ^ m 1 , m 2 T e ^ m 1 , m 2 u m 1 , m 2 , 1 u m 1 , m 2 , 2 u m 1 , m 2 , N = 1 P B S y d m 1 , m 2 T F 1 ,
where u m 1 , m 2 , n is the estimation of g m 1 , n g m 2 , n and F 1 1 × ( N + 1 ) ϕ ¯ C ( 1 + N ) × ( 1 + N ) . After combining (12) and (13), we obtain
u ^ m 1 , m 2 T = e m 1 , m 2 g m 1 g m 2 T + q ¯ m 1 , m 2 + T n ¯ m 1 , m 2 T F 1 P B S .
The independence of a m 1 , m 2 , n from the channel coefficients of other RIS elements allows us to partition the task of estimating the BS-RIS channel into N distinct subproblems. Each subproblem focuses on estimating the channel coefficients associated with a specific RIS element, indexed by n.
The n-th subproblem can be defined by Equation (15):
g ^ 1 , n , g ^ 2 , n , , g ^ M , n = arg min g 1 , n , g 2 , n , , g M , n J n g 1 , n , g 2 , n , , g M , n ,
where
J n g 1 , n , g 2 , n , , g M , n m 1 , m 2 S a m 1 , m 2 , n g m 1 , n g m 2 , n 2 .
g ^ m , n i = m , m S a m , m , n g m , n i , m * + m , m S a m , m , n g m , n i , m * m , m S g m , n i , m 2 + m , m S g m , n i , m 2 ,
where
g m , n i . m g ^ m , n i , g ^ m , n i 1 , m < m m > m .
Define S { m 1 , m 2 1 m 1 L , 1 m 2 M , m 1 m 2 } . In this step, we first calculate the initial channel estimates g ^ 1 , n 0 , g ^ 2 , n 0 ,⋯, g ^ M , n 0 to help the following iterative refinement converge faster, which are given by
g ^ m 1 , n 0 a m 1 , m 2 , n a m 1 , m 3 , n a m 2 , m 3 , n ,
g ^ m , n 0 a m 1 , m , n g ^ m 1 , n 0 , 1 m M , m m 1 .
Then, we formulate the problem of estimation of BS-RIS channels as (15), shown at the top of the next page. The details can be further seen in [34]. Finally, we derive the expression for g ^ m , n i by making J n g m , n = J n g m , n * = 0 , and g ^ m , n i is given by (17).
A least squares method is proposed to address the problem of estimating a RIS-UAV channel. Similar to the work in [40], the transmission frame of the uplink pilot contains R subframes. The uplink’s received signal corresponding to the t-th subframe is written as
y t u = G diag ϕ ˜ t f + n ˜ t = A t f + n ˜ t , t = 1 , 2 , , R ,
where ϕ ˜ t C N × 1 denotes the reflection coefficient vector of RIS in the t-th subframe, n ˜ t C M × 1 is the noise, and we have
A t G diag ϕ ˜ t .
Due to the small-scale fading resulting from possible environment variations around the BS-RIS channel, we attempt to replace G with a G ^ ( G ^ ( i , j ) = g ^ i j , 1 i M , 1 j N .) estimated BS-RIS channel to achieve a more practical authentication performance. As a result, the estimated model of a cascaded channel given in (8) (using a time index) is expressed by
H ^ k = G ^ k diag f k + W k .
Without loss of generality, the estimated value of the matrix A A 1 T , A 2 T , , A R T T C M R × N can be written as
A ^ ( k ) G ^ ( k ) diag ϕ ˜ 1 G ^ ( k ) diag ϕ ˜ R .
Finally, combing Equations (21) and (24), the RIS-UAV channel estimation is given by
f ^ ( k ) = A ^ H ( k ) A ^ ( k ) 1 A ( k ) ^ H y u ( k ) ,
where y u ( k ) is the equivalent received signal corresponding to R collected subframes (i.e., y u ( k ) y 1 u T ( k ) , y 2 u T ( k ) , , y R u T ( k ) T C M R × 1 ).

3.2. Channel Quantization

After obtaining the cascaded channel estimates (BS-RIS channel estimation denoted by G ^ ( k ) and RIS-UAV channel estimation denoted by f ^ ( k ) ), based on the quantizer’s output, we view the method of authentication as a problem of testing binary hypotheses. Particularly, we utilize a cascaded channel gain quantizer introduced in [20]. This quantizer assesses the square of the disparity between the current and the preceding cascaded channel gain, calculated at consecutive time intervals, against a predefined threshold γ . For simplification, let X { A , E } be the origin of the current signal with A and E being Alice and Eve, respectively. If the difference is larger than the given threshold, this means that the two channels are not correlated, which indicates that the transmitted signal may be from Eve ( X = E ); then the value of the quantizer is 1. Conversely, it is assumed that the source of the current signal is Alice ( X = A ), and the quantizer output is 0.
Consider that Bob has M antennas and RIS equipped with N antennas receives signals from a single UAV UE with only one antenna, and the total number of channels in the whole communication system is L = M × N . For the quantization of cascaded channels, the result is the sum of the quantization results corresponding to each sub-cascaded channel (i.e., h X , i j , 1 i M , 1 j N ). Therefore, the quantizer Q h for an estimated sub-cascaded channel gain h ^ X , i j ( X { E , A } ) at time k 1 and k can be given by
O i j Q h h ^ X , i j k h ^ A , i j k 1 2 = 0 , h ^ X , i j k h ^ A , i j k 1 2 γ , 1 , otherwise .
where O i j denotes the output of the quantizer of the subcascaded channel and h ^ i j ( k ) is the ( i , j ) th (for i , j { 1 , 2 , N } ) channel complement of H ^ ( k ) (i.e., [ H ^ ( k ) ] i j = h ^ i j ( k ) ).
Let D be the output sum of channel gain quantizer and D is given by
D i = 1 M j = 1 N O i j .
Mathematically, D is a random variable being the sum of the output of the 1-bit channel quantizers.
Please note that 1-bit quantizers inevitably cause a slight decrease in authentication performance. In future work, we will theoretically model its quantization error and design strategies to optimize its impact on authentication systems. However, our simulation results also indicate that the proposed authentication scheme can still meet the basic requirements of authentication even under performance loss from quantization error.

3.3. Authentication Decision

Applying the adopted one-dimensional quantization scheme, an authentication decision criterion is formulated as a simple hypothesis testing. Using the quantified results of the cascade channel gain, the identity legitimacy of the transmitter is then determined. The authentication decision criterion is expressed by
H 0 : D Z , H 1 : D > Z .
where H 0 represents the hypothesis that the current signal originates from Alice, while H 1 denotes the hypothesis that it originates from Eve. The judgment threshold in the hypothesis testing is denoted as Z. If the quantization result of the cascaded channel gain is less than or equal to the judgment threshold, i.e., the hypothesis H 0 is satisfied, then the current signal transmitter can be considered as the legitimate UAV UE Alice, and vice versa, i.e., the hypothesis H 1 is satisfied and the current transmitter is considered as Eve. In fact, the authentication decision depends on the relation between the preset threshold and the sum of M N outputs of the 1-bit quantizer Q h [ · ] , and thus, D can be also considered a detector.
We employ a coordinate descent-based algorithm to iteratively optimize quasi-static BS-RIS channel estimation. This process includes partitioning the problem into N independent subproblems for estimating the channel between the BS and a single RIS element, calculating initial estimates for each subproblem, and iteratively refining the BS-RIS channel estimates using the coordinate descent algorithm. Following this, the LS-based algorithm is used to estimate the channels for the mobile but low-dimensional BS-UAV and RIS-UAV. The channel estimation methods utilized in this research are uncomplicated and economical. Moreover, the coordinate descent-based algorithm proposed here shows swift and consistent convergence. It is crucial to highlight that the estimation capabilities of composite channels based on these two approaches meet the authentication criteria (as illustrated in Section 5).
The primary challenge of the proposed approach is the complexity of estimating the high-dimensional BS-RIS channel due to the passive nature of RIS, which prevents the transmission or reception of pilots. The initial estimation of the BS-RIS channel using a full-duplex technique enables the subsequent estimation of the low-dimensional RIS-UAV and BS-UAV channels using a standard uplink pilot transmission scheme and a least squares-based algorithm. Consequently, the channel estimation for RIS-UAV and BS-UAV mirrors the process used in massive MIMO setups. It is noteworthy that while the total channel gains in massive MIMO setups increase linearly with the number of antennas/elements (N) in the far field, the gains in the RIS setup grow quadratically as N 2 . The analytical results for performance metrics such as false alarm and detection probabilities will be derived in Section 4, where differences between the massive MIMO setup and the RIS setup will be discussed.
Based on Lemma 1 in [41], the BS-RIS channel cannot be exactly estimated when the considered system does not provide full-duplex technique support at the BS. Hence, investigating the use of unreliable channel estimation for authentication presents an intriguing area for future research, aiming to delve deeper into the effective utilization of channel characteristics to enhance the security of RIS-enabled communication systems. We also notice that the approach proposed in [29] without requiring full-duplex technique support poses a good estimation performance, but the channel estimation approach proposed in [41] with a similar protocol has a better channel estimation performance. Hence, in our future work, we will examine the authentication performance of the channel-based scheme with inaccurate channel estimation based on [29,41].

4. Modeling of Performance Metrics

4.1. Probability of Quantizer Output 1 under Each Hypothesis

Let H q , q { 0 , 1 } denote the square of the difference between the current cascaded channel at time k and the previous one at time k 1 .
H q h ^ X , i j k h ^ A , i j k 1 2 .
On H 0 , the current signal is from Alice, and the difference h A , A can be written as
h A , A h ^ A , i j k h ^ A , i j k 1 = α 1 g ^ i j k 1 f A , j k 1 + 1 α 2 g ^ i j k 1 v A , j k 1 + w i j k w i j k 1 ,
where f A , j ( k 1 ) and v A , j ( k 1 ) and w i j ( k 1 ) are elements in f ( k 1 ) , v ( k 1 ) , and W ( k 1 ) at time k 1 , respectively.
We know that f A , j ( k 1 ) , v A , j ( k 1 ) , w ( k ) , and w ( k 1 ) are zero-mean Gaussian distributed variables with variances σ f A 2 and σ w 2 , respectively. Hence, for a given g ^ i j k 1 , h A , A is a zero-mean complex Gaussian random variable with variance 2 1 α | g ^ i j k 1 | 2 σ f A 2 + 2 σ w 2 . To sum up, H 0 obeys exponential distribution, that is,
H 0 exp 1 2 1 α | g ^ i j k 1 | 2 σ f A 2 + 2 σ w 2 .
For a given threshold γ , the probability of the output of each quantizer under null hypothesis H 0 can be evaluated as
P H 0 Pr Q h h ^ X , i j k h ^ A , i j k 1 2 = 1 H 0 = Pr H 0 > γ = exp γ 2 1 α | g ^ i j k 1 | 2 σ f A 2 + 2 σ w 2 .
On H 1 , the current transmitter is Eve, and h E , A is given by
h E , A h ^ E , i j k h ^ A , i j k 1 = α g ^ i j k 1 f E , j k 1 + 1 α 2 g ^ i j k 1 v E , j k 1 g ^ i j k 1 f A , j k 1 + w i j k w i j k 1 .
Similarly, we can obtain that h E , A is a zero-mean complex Gaussian random variable with variance | g ^ i j k 1 | 2 σ f E 2 + σ f A 2 + 2 σ ω 2 . H 1 obeys exponential distribution, which can be written as
H 1 exp 1 | g ^ i j k 1 | 2 σ f E 2 + σ f A 2 + 2 σ ω 2 .
For a given threshold γ , the probability of the output of each quantizer under hypothesis H 1 can be evaluated as
P H 1 Pr Q h h ^ X , i j k h ^ A , i j k 1 2 = 1 H 1 = Pr H 1 > γ = exp γ | g ^ i j k 1 | 2 σ f E 2 + σ f A 2 + 2 σ ω 2 .

4.2. False Alarm and Detection Probabilities

We use P f and P d to denote the false alarm and detection probabilities, respectively. For a given P H 0 and P H 1 , P f and P d can be analytically evaluated. When employing location-specific cascaded channel features in the proposed scheme to authenticate the origin of the current signal, the evaluation of P f and P d is carried out as follows.
P f = Pr D = Z + 1 or D = Z + 2 or or D = L H 0 = Pr D = Z + 1 H 0 + Pr D = Z + 2 H 0 + + Pr D = L H 0 = z = Z + 1 L Pr D = z H 0 = z = Z + 1 L Pr D = z H 0 = z = Z + 1 L L z P H 0 z 1 P H 0 L z ,
P d = 1 Pr D = 0 o r D = 1 o r o r D = Z H 1 = 1 [ Pr D = 0 H 1 + Pr D = 1 H 1 + + Pr D = Z H 1 ] = 1 z = 0 Z Pr D = z H 1 = 1 z = 0 Z L z P H 1 z 1 P H 1 L z .
The derivation for P f and P d relies on the Gaussian assumption regarding the channels G ( k ) , f ( k ) , and H ( k ) . Both the BS-RIS and RIS-UAV paths follow Rayleigh fading distribution due to the isotropic scattering assumption, which is a common assumption in all related works [34,42]. This Gaussian assumption provides an insight characterization for the typical authentication performance metrics (false alarm and detection probabilities) and is helpful in establishing statistically theoretical results.

4.3. Computational Complexity

The proposed authentication scheme uses channel gains, and hence, the computational complexity of the scheme mainly results from the channel estimation, channel quantization, and authentication decision. In particular, the computational complexity of the coordinate descent-based algorithm for the quasi-static BS-RIS channel estimation is O ( N 3 + M L N 2 + M N L C ) while taking into account the number of iterations, where C is the maximal number of outer iterations and L is the number of time slots for one subframe; the computational complexity of the LS-based algorithm for the mobile but low-dimensional BS-UE and RIS-UAV channels is O ( ( N + M ) 3 + ( N + M ) 2 ) ; and the computational complexity of channel quantization and authentication decision is O ( 2 M N ) . As a result, the whole complexity of the proposed scheme is O ( N 3 + M L N 2 + M N L C + 2 M N ) . For the scheme in [21], the computational complexity is O ( N 3 M 5 ) . It is evident for the massive MIMO systems ( N = M = 64 ) that our proposed scheme offers a substantial benefit in terms of reduced computational complexity. Given the powerful computational capabilities of smart devices in RIS-enabled communication systems, the additional computational complexity is also generally acceptable in engineering practices.

5. Evaluation

Two sets of 200 symbols are present in the data frames. The initial frame, which is authored by Alice, undergoes validation by Bob through the use of higher-layer authentication methods. Subsequently, the second frame is received by Bob with the assistance of RIS, 300 μ s after the first one. If the second frame is also sent by Alice, we calculate time-varying channel coefficients that cover both frames, using specific parameters for each iteration. If the frame is sent by Eve, we generate independent channel matrices instead. The effectiveness of the suggested method’s authentication is closely tied to the average SNR at Bob. Extensive simulation experiments have been undertaken to validate the theoretical findings in relation to P f and P d under the specified configurations ( M = 4 , N = 2 , σ f A 2 = 1 × 10 4 , σ f E 2 = 1 × 10 5 , α = 0.9 ).
In Figure 4, we investigate how SNR affects the detection probability P d with the settings of Z { 1 , 2 , 3 , 4 } . We can see from Figure 4 that, for a given threshold Z, P d improves monotonously as SNR increases in a relatively lower regime. Specifically, in a low SNR regime (e.g., SNR is smaller than −3 dB), P d quickly grows, and when SNR is larger than −2 dB, P d tends to be 1. It reveals that our proposed scheme has a good performance benefit from SNR. The decrease in estimation error is attributed to the increase in signal-to-noise ratio (SNR), resulting in a more precise estimation. Another notable finding is that, under a constant SNR, a smaller threshold, Z, is associated with a higher value for P d , whereas a larger threshold, Z, is linked to a lower value for P d . Given the energy constraint, it is commonly anticipated that the power level of wireless networks will be below a specific threshold. As a result, it becomes crucial to accurately establish the threshold parameter (e.g., Z) in order to attain the desired authentication performance within a specified power constraint. In addition, we note that multiple lines converge as SNR is in a high regime. The convergence observed in Figure 4 can be attributed to the fact that when the signal-to-noise ratio (SNR) reaches a certain threshold, such as −2 dB, the accuracy of the estimation algorithm reaches a bottleneck. At this point, the influence of SNR on channel fingerprint extraction becomes minimal. As a result, the detection rate of the authentication scheme converges.
As seen from Figure 5, P f decreases sharply when SNR increases for a given γ in a relatively low SNR regime, while in a relatively high regime, P f gradually tends towards 0. This tells us that using a larger power to transmit data signals is helpful in reducing false alarm property P f . We also observe that, given a fixed SNR, the false alarm probability P f decreases as the threshold γ increases. Similarly, it needs to appropriately set the threshold parameters (e.g., Z and γ ) to satisfy the performance requirements under a given power limitation.
Receiver operating characteristic (ROC) curves are employed to provide an additional illustration of the performance of the proposed scheme. In Figure 6, we show how SNR affects the authentication performance ( P f , P d ) for ( M = 4 , N = 2 , σ f A 2 = 1 × 10 4 , σ f E 2 = 1 × 10 5 , α = 0.9 ). One can note from Figure 6 that the simulation and theoretical results are close to each other, verifying the correctness of the proposed theoretical performance models. In other words, we can use these models to precisely capture the authentication performance and conduct theoretical analysis. Moreover, one can also note from Figure 6 that increasing SNR can obtain a large P d and a low P f . Even for a small SNR (e.g., SNR = −16 dB), we can see that when P f < 0.02 , P d can exceed 0.95. It indicates that the scheme is effective for RIS-enabled wireless communication systems to authenticate transmitters and can be a complement to traditional cryptography-based authentication approaches.
The impact of a channel correlation coefficient for the cascaded channel on performance is also investigated in Figure 7. We plot in Figure 7 ROC curves under different channel correlation coefficients and the settings of Z = 1 , γ 0.01 0.02 , and SNR = 1 dB. In Figure 7, it is evident that the proposed scheme demonstrates its optimal authentication performance when α = 1 and its weakest performance when α = 0.5 . This indicates that the proposed scheme is better suited for slow-fading RIS-enabled wireless communication. It is noteworthy that the ROC curves for different α values are closely aligned, with all four curves yielding P d values exceeding 0.95 while maintaining very low P f . Consequently, our proposed authentication scheme holds great promise for applications in high-speed environments.
To further validate the performance of the proposed scheme, we illustrate in Figure 8 the confidence interval and actual theoretical value of P f under different SNRs with the settings of Z = 1 , M = 4 , N = 2 , and α = 0.9 . As observed from Figure 8, we can note that the actual value of P f is within the 95% confidence interval, indicating the reliability and correctness of the adopted false alarm performance model. In other words, the derived performance expression can effectively characterize the authentication performance of the proposed scheme.
In Figure 9, we present a comparison of the performances of the existing scheme without RIS (one-hop channel) described in [19,20] and our proposed scheme utilizing RIS-enabled UAV communication (cascaded channel with RIS). Here, we consider a low SNR regime mainly to explore the illegal device detection performance of the proposed scheme in RIS systems under poor signal environment conditions and to investigate the application potential in disaster scenarios or remote locations with weak signal strength. For the benchmark in [19,20], we consider that there is only a direct link between the transceiver ends and utilize the classic LMMSE algorithm for direct channel estimation. Then, these channel estimates are quantified to determine whether the current transmitter is a legitimate device based on the quantization results. As shown in Figure 9, we note that our scheme is superior to [19], while it is slightly poorer than [20]. Specifically, under an SNR = −8 dB, the P d of [19], our scheme, and [20] are 0.8, 0.9, and 0.92, respectively. The reason is that the method in [19] depends on the strong channel temporal correlation; such a method may encounter performance loss when considering the high-speed UAV mobility (i.e., small α ). In addition, the cascaded channel resulting from the introduction of RIS entails the multiplication of two individual channel components. As such, this channel is highly dynamic and complex, leading to reduced accuracy in cascaded channel estimation and degraded authentication performance compared with [20]. However, although the performance under cascaded channels is not as good as that of the existing scheme without RIS [20], it keeps a relatively high detection probability even in a low SNR regime. This indicates that we can achieve a trade-off between security and communication service: our proposed scheme is expected to achieve high authentication performance and guarantee the identification security of legitimate users while exploiting RIS to improve communication coverage to provide more reliable services for users.

6. Conclusions

In this study, we established a novel PHY-layer authentication using a cascade channel signature within the RIS-enabled UAV wireless communication system for verifying the transmitter’s identity. With the least squares estimate and a coordinate descent-based algorithm, we first effectively extracted the RIS-cascaded channel features. Then, a quantizer was introduced to quantify channel gain fluctuations, which are critical for generating authentication decision criteria under a binary hypothesis test. By leveraging hypothesis testing and statistical signal processing, we further analytically derived closed-form expressions for both false alarm and detection probabilities. These theoretical findings were then substantiated by extensive simulation results, affirming their accuracy. The outcomes of this investigation show that our scheme can achieve an improvement of 10% in detection accuracy compared with existing works and offers valuable insights for devising cost-effective authentication approaches centered on RIS-induced channel characteristics to fortify RIS-enabled wireless networks.

Author Contributions

Conceptualization, C.Q. and P.Z.; methodology, M.N.; validation, J.H., M.N. and C.Q.; investigation, C.Q.; writing—original draft preparation, P.Z.; writing—review and editing, J.H.; funding acquisition, J.H. All authors have read and agreed to the published version of the manuscript.

Funding

This work was supported in part by a Natural Science Foundation of China (NSFC) grant (62272241), a Japan Society for the Promotion of Science (JSPS) grant (18H03235), and a Nanjing University of Posts and Telecommunications Scientific Research Foundation grant (NY221122).

Data Availability Statement

The original contributions presented in the study are included in the article, further inquiries can be directed to the corresponding author.

Conflicts of Interest

The authors declare no conflicts of interest.

References

  1. Liu, Y.; Liu, X.; Mu, X.; Hou, T.; Xu, J.; Di Renzo, M.; Al-Dhahir, N. Reconfigurable intelligent surfaces: Principles and opportunities. IEEE Commun. Surv. Tutor. 2021, 23, 1546–1577. [Google Scholar] [CrossRef]
  2. Jian, M.; Alexandropoulos, G.C.; Basar, E.; Huang, C.; Liu, R.; Liu, Y.; Yuen, C. Reconfigurable intelligent surfaces for wireless communications: Overview of hardware designs, channel models, and estimation techniques. Intell. Converg. Netw. 2022, 3, 1–32. [Google Scholar] [CrossRef]
  3. Zhou, S.; Xu, W.; Wang, K.; Di Renzo, M.; Alouini, M.S. Spectral and energy efficiency of IRS-assisted MISO communication with hardware impairments. IEEE Wirel. Commun. Lett. 2020, 9, 1366–1369. [Google Scholar] [CrossRef]
  4. Alexandropoulos, G.C.; Shlezinger, N.; Del Hougne, P. Reconfigurable intelligent surfaces for rich scattering wireless communications: Recent experiments, challenges, and opportunities. IEEE Commun. Mag. 2021, 59, 28–34. [Google Scholar] [CrossRef]
  5. You, C.; Kang, Z.; Zeng, Y.; Zhang, R. Enabling Smart Reflection in Integrated Air-Ground Wireless Network: IRS Meets UAV. IEEE Wirel. Commun. 2021, 28, 138–144. [Google Scholar] [CrossRef]
  6. Mohsan, S.A.H.; Khan, M.A.; Alsharif, M.H.; Uthansakul, P.; Solyman, A.A.A. Intelligent Reflecting Surfaces Assisted UAV Communications for Massive Networks: Current Trends, Challenges, and Research Directions. Sensors 2022, 22, 5278. [Google Scholar] [CrossRef] [PubMed]
  7. Cicek, C.T.; Gultekin, H.; Tavli, B.; Yanikomeroglu, H. UAV Base Station Location Optimization for Next Generation Wireless Networks: Overview and Future Research Directions. In Proceedings of the 2019 1st International Conference on Unmanned Vehicle Systems-Oman (UVS), Muscat, Oman, 5–7 February 2019; pp. 1–6. [Google Scholar]
  8. Tarekegn, G.B.; Juang, R.; Lin, H.; Munaye, Y.Y.; Wang, L.; Bitew, M.A. Deep-Reinforcement-Learning-Based Drone Base Station Deployment for Wireless Communication Services. IEEE Internet Things J. 2022, 9, 21899–21915. [Google Scholar] [CrossRef]
  9. Khawaja, W.; Güvenç, I.; Matolak, D.W.; Fiebig, U.; Schneckenburger, N. A Survey of Air-to-Ground Propagation Channel Modeling for Unmanned Aerial Vehicles. IEEE Commun. Surv. Tutor. 2019, 21, 2361–2391. [Google Scholar] [CrossRef]
  10. Tarekegn, G.B.; Juang, R.; Lin, H.; Munaye, Y.Y.; Wang, L.; Jeng, S. Channel Quality Estimation in 3D Drone Base Station for Future Wireless Network. In Proceedings of the 30th Wireless and Optical Communications Conference, WOCC 2021, Taipei, Taiwan, 7–8 October 2021; pp. 236–239. [Google Scholar]
  11. Mahmood, A.; Vu, T.X.; Khan, W.U.; Chatzinotas, S.; Ottersten, B.E. Optimizing Computational and Communication Resources for MEC Network Empowered UAV-RIS Communication. In Proceedings of the IEEE Globecom 2022 Workshops, Rio de Janeiro, Brazil, 4–8 December 2022; pp. 974–979. [Google Scholar]
  12. Li, N.; Li, X.; Yan, Y.; Sun, Q.; Han, Y.; Cheng, K. Joint Communication and Computing Resource Optimization for Collaborative AI Inference in Mobile Networks. In Proceedings of the 2023 IEEE 98th Vehicular Technology Conference (VTC2023-Fall), Hongkong, China, 10–13 October 2023; pp. 1–5. [Google Scholar]
  13. Bansal, A.; Agrawal, N.; Singh, K.; Li, C.P.; Mumtaz, S. RIS Selection Scheme for UAV-Based Multi-RIS-Aided Multiuser Downlink Network With Imperfect and Outdated CSI. IEEE Trans. Commun. 2023, 71, 4650–4664. [Google Scholar] [CrossRef]
  14. Liu, X.; Liu, Y.; Chen, Y. Machine Learning Empowered Trajectory and Passive Beamforming Design in UAV-RIS Wireless Networks. IEEE J. Sel. Areas Commun. 2021, 39, 2042–2055. [Google Scholar] [CrossRef]
  15. Zhang, J.; Woods, R.F.; Sandell, M.; Valkama, M.; Marshall, A.; Cavallaro, J.R. Radio Frequency Fingerprint Identification for Narrowband Systems, Modelling and Classification. IEEE Trans. Inf. Forensics Secur. 2021, 16, 3974–3987. [Google Scholar] [CrossRef]
  16. Wang, N.; Jiao, L.; Wang, P.; Li, W.; Zeng, K. Machine learning-based spoofing attack detection in mmWave 60GHz IEEE 802.11ad Networks. In Proceedings of the 39th IEEE Conference on Computer Communications, INFOCOM 2020, Toronto, ON, Canada, 6–9 July 2020; pp. 2579–2588. [Google Scholar]
  17. Xu, J.; Wei, D. Polarization Fingerprint-Based LoRaWAN Physical Layer Authentication. IEEE Trans. Inf. Forensics Secur. 2023, 18, 4593–4608. [Google Scholar] [CrossRef]
  18. Wang, N.; Li, W.; Jiao, L.; Alipour-Fanid, A.; Xiang, T.; Zeng, K. Orientation and channel-independent RF fingerprinting for 5G IEEE 802.11 ad devices. IEEE Internet Things J. 2021, 9, 9036–9048. [Google Scholar] [CrossRef]
  19. Xiao, L.; Greenstein, L.J.; Mandayam, N.B.; Trappe, W. Using the physical layer for wireless authentication in time-variant channels. IEEE Trans. Wirel. Commun. 2008, 7, 2571–2579. [Google Scholar] [CrossRef]
  20. Liu, J.; Wang, X. Physical layer authentication enhancement using two-dimensional channel quantization. IEEE Trans. Wirel. Commun. 2016, 15, 4171–4182. [Google Scholar] [CrossRef]
  21. Zhang, P.; Shen, Y.; Jiang, X.; Wu, B. Physical Layer Authentication Jointly Utilizing Channel and Phase Noise in MIMO Systems. IEEE Trans. Commun. 2020, 68, 2446–2458. [Google Scholar] [CrossRef]
  22. Xie, N.; Chen, J.; Huang, L. Physical-layer authentication using multiple channel-based features. IEEE Trans. Inf. Forensics Secur. 2021, 16, 2356–2366. [Google Scholar] [CrossRef]
  23. Jing, T.; Huang, H.; Gao, Q.; Wu, Y.; Huo, Y.; Wang, Y. Multi-User Physical Layer Authentication Based on CSI Using ResNet in Mobile IIoT. IEEE Trans. Inf. Forensics Secur. 2024, 19, 1896–1907. [Google Scholar] [CrossRef]
  24. Tang, J.; Xu, A.; Jiang, Y.; Zhang, Y.; Wen, H.; Zhang, T. MmWave MIMO physical layer authentication by using channel sparsity. In Proceedings of the 2020 IEEE International Conference on Artificial Intelligence and Information Systems (ICAIIS), Dalian, China, 20–22 March 2020; pp. 221–224. [Google Scholar]
  25. Wu, Y.; Wei, D.; Guo, C.; Huang, W. Physical Layer Authentication Based on Channel Polarization Response in Dual-Polarized Antenna Communication Systems. IEEE Trans. Inf. Forensics Secur. 2023, 18, 2144–2159. [Google Scholar] [CrossRef]
  26. Tang, W.; Dai, J.Y.; Chen, M.Z.; Wong, K.K.; Li, X.; Zhao, X.; Jin, S.; Cheng, Q.; Cui, T.J. MIMO transmission through reconfigurable intelligent surface: System design, analysis, and implementation. IEEE J. Sel. Areas Commun. 2020, 38, 2683–2699. [Google Scholar] [CrossRef]
  27. Wu, X.; Ma, S.; Yang, X. Tensor-based low-complexity channel estimation for mmWave massive MIMO-OTFS systems. J. Commun. Inf. Netw. 2020, 5, 324–334. [Google Scholar] [CrossRef]
  28. Zhang, R.; Cheng, L.; Wang, S.; Lou, Y.; Gao, Y.; Wu, W.; Ng, D.W.K. Integrated Sensing and Communication with Massive MIMO: A Unified Tensor Approach for Channel and Target Parameter Estimation. IEEE Trans. Wirel. Commun. 2024. Early Access. [Google Scholar]
  29. Wang, Z.; Liu, L.; Cui, S. Channel estimation for intelligent reflecting surface assisted multiuser communications: Framework, algorithms, and analysis. IEEE Trans. Wirel. Commun. 2020, 19, 6607–6620. [Google Scholar] [CrossRef]
  30. Alwazani, H.; Kammoun, A.; Chaaban, A.; Debbah, M.; Alouini, M.S. Intelligent reflecting surface-assisted multi-user MISO communication: Channel estimation and beamforming design. IEEE Open J. Commun. Soc. 2020, 1, 661–680. [Google Scholar]
  31. Ardah, K.; Gherekhloo, S.; de Almeida, A.L.; Haardt, M. TRICE: A channel estimation framework for RIS-aided millimeter-wave MIMO systems. IEEE Signal Process. Lett. 2021, 28, 513–517. [Google Scholar] [CrossRef]
  32. Ji, Z.; Yeoh, P.L.; Zhang, D.; Chen, G.; Zhang, Y.; He, Z.; Yin, H.; Li, Y. Secret key generation for intelligent reflecting surface assisted wireless communication networks. IEEE Trans. Veh. Technol. 2021, 70, 1030–1034. [Google Scholar] [CrossRef]
  33. Ji, Z.; Yeoh, P.L.; Chen, G.; Pan, C.; Zhang, Y.; He, Z.; Yin, H.; Li, Y. Random shifting intelligent reflecting surface for OTP encrypted data transmission. IEEE Wirel. Commun. Lett. 2021, 10, 1192–1196. [Google Scholar] [CrossRef]
  34. Hu, C.; Dai, L.; Han, S.; Wang, X. Two-timescale channel estimation for reconfigurable intelligent surface aided wireless communications. IEEE Trans. Commun. 2021, 69, 7736–7747. [Google Scholar] [CrossRef]
  35. Badiu, M.A.; Coon, J.P. Communication through a large reflecting surface with phase errors. IEEE Wirel. Commun. Lett. 2019, 9, 184–188. [Google Scholar] [CrossRef]
  36. Khel, A.M.T.; Hamdi, K.A. Effects of hardware impairments on IRS-enabled MISO wireless communication systems. IEEE Commun. Lett. 2021, 26, 259–263. [Google Scholar] [CrossRef]
  37. Özdogan, Ö.; Björnson, E.; Larsson, E.G. Intelligent Reflecting Surfaces: Physics, Propagation, and Pathloss Modeling. IEEE Wirel. Commun. Lett. 2020, 9, 581–585. [Google Scholar] [CrossRef]
  38. Jakes, W.C.; Cox, D.C. Microwave Mobile Communications; Wiley: Hoboken, NJ, USA, 1994. [Google Scholar]
  39. Masmoudi, A.; Le-Ngoc, T. Channel estimation and self-interference cancelation in full-duplex communication systems. IEEE Trans. Veh. Technol. 2016, 66, 321–334. [Google Scholar] [CrossRef]
  40. Jensen, T.L.; De Carvalho, E. An optimal channel estimation scheme for intelligent reflecting surfaces based on a minimum variance unbiased estimator. In Proceedings of the ICASSP 2020-2020 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), Barcelona, Spain, 4–8 May 2020; pp. 5000–5004. [Google Scholar]
  41. Guo, H.; Lau, V.K.N. Uplink cascaded channel estimation for intelligent reflecting surface assisted multiuser MISO systems. IEEE Trans. Signal Process. 2022, 70, 3964–3977. [Google Scholar] [CrossRef]
  42. Björnson, E.; Sanguinetti, L. Rayleigh fading modeling and channel hardening for reconfigurable intelligent surfaces. IEEE Wirel. Commun. Lett. 2020, 10, 830–834. [Google Scholar] [CrossRef]
Figure 1. System model.
Figure 1. System model.
Drones 08 00358 g001
Figure 2. Flowchart of the proposed PHY-layer authentication scheme.
Figure 2. Flowchart of the proposed PHY-layer authentication scheme.
Drones 08 00358 g002
Figure 3. Channel estimation framework.
Figure 3. Channel estimation framework.
Drones 08 00358 g003
Figure 4. P d vs. SNR.
Figure 4. P d vs. SNR.
Drones 08 00358 g004
Figure 5. P f vs. SNR.
Figure 5. P f vs. SNR.
Drones 08 00358 g005
Figure 6. ROC curves under different SNRs.
Figure 6. ROC curves under different SNRs.
Drones 08 00358 g006
Figure 7. ROC curves under different channel correlation coefficients.
Figure 7. ROC curves under different channel correlation coefficients.
Drones 08 00358 g007
Figure 8. The confidence interval and actual value of P f under different SNRs.
Figure 8. The confidence interval and actual value of P f under different SNRs.
Drones 08 00358 g008
Figure 9. Performance comparison with existing works in [19,20].
Figure 9. Performance comparison with existing works in [19,20].
Drones 08 00358 g009
Table 1. Summary of the related works.
Table 1. Summary of the related works.
ReferencesAuthentication ParametersApplication Scenario
[15]CFO, IQ imbalance, and PA nonlinearitiesIoT systems
[16]SNR trace featuremmWave systems
[17]polarization fingerprintLoRaWAN
[19]channel frequency responseMIMO systems
[20]channel impulse responsemobile MIMO scenario
[21]channel gain and phase noiseMIMO systems
[26]channel sparsitymmWave systems
Our schemecascaded channel gainRIS-UAV communication systems
Table 2. Summary of important symbols.
Table 2. Summary of important symbols.
SymbolsDescription
( · ) * / ( · ) H / ( · ) T Conjugate/conjugate transpose/transpose operators.
Hadamard product.
| · | Absolute value operator.
Pr(·)Probability operator.
Definition.
diag ( a ) A diagonal matrix with vector a .
vec ( G ) The vectorization of the matrix G .
f ( k ) The RIS-UAV channel with f i ( k ) being the ith channel component.
G ( k ) The channel for BS-RIS.
ϕ The coefficient of the reflecting elements on RIS.
f d The normalized maximum Doppler frequency.
vThe mobile speed of UAV.
f c /c/ T s Carrier frequency/speed of light/sampling interval.
J 0 ( · ) Zero-order Bessel function of the first kind.
α Correlation coefficient for the UAV(Alice/Eve)-RIS channel.
P B S Signal power.
ϕ ˜ t The reflection coefficient vector of RIS in the t-th subframe.
A/EAlice/Eve.
γ A predefined threshold.
O i j The output of the quantizer of the subcascaded channel.
H 0 / 1 The current signal originates from Alice/Eve.
ZThe judgment threshold in the hypothesis testing.
H q The square of the difference between the current cascaded channel at time k and the previous one at time k 1 .
exp ( · ) Exponential function.
P f / d The false alarm probabilities/the detection probabilities.
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Qin, C.; Niu, M.; Zhang, P.; He, J. Exploiting Cascaded Channel Signature for PHY-Layer Authentication in RIS-Enabled UAV Communication Systems. Drones 2024, 8, 358. https://doi.org/10.3390/drones8080358

AMA Style

Qin C, Niu M, Zhang P, He J. Exploiting Cascaded Channel Signature for PHY-Layer Authentication in RIS-Enabled UAV Communication Systems. Drones. 2024; 8(8):358. https://doi.org/10.3390/drones8080358

Chicago/Turabian Style

Qin, Changjian, Mu Niu, Pinchang Zhang, and Ji He. 2024. "Exploiting Cascaded Channel Signature for PHY-Layer Authentication in RIS-Enabled UAV Communication Systems" Drones 8, no. 8: 358. https://doi.org/10.3390/drones8080358

APA Style

Qin, C., Niu, M., Zhang, P., & He, J. (2024). Exploiting Cascaded Channel Signature for PHY-Layer Authentication in RIS-Enabled UAV Communication Systems. Drones, 8(8), 358. https://doi.org/10.3390/drones8080358

Article Metrics

Back to TopTop