Title :
On the Error Region for Channel Estimation-Based Physical Layer Authentication Over Rayleigh Fading
Author :
Ferrante, Augusto ; Laurenti, Nicola ; Masiero, Chiara ; Pavon, Michele ; Tomasin, Stefano
Author_Institution :
Dept. of Inf. Eng., Univ. of Padua, Padua, Italy
Abstract :
For a physical layer message authentication procedure based on the comparison of channel estimates obtained from the received messages, we focus on an outer bound on the type I/II error probability region. Channel estimates are modeled as multivariate Gaussian vectors, and we assume that the attacker has only some side information on the channel estimate, which he does not know directly. We derive the attacking strategy that provides the tightest bound on the error region, given the statistics of the side information. This turns out to be a zero mean, circularly symmetric Gaussian density whose covariance matrices can be obtained by solving a constrained optimization problem. We propose an iterative algorithm for its solution: starting from the closed-form solution of a relaxed problem, we obtain, by projection, an initial feasible solution; then, by an iterative procedure, we look for the fixed-point solution of the problem. Numerical results show that for cases of interest the iterative approach converges, and perturbation analysis shows that the found solution is a local minimum.
Keywords :
Rayleigh channels; channel estimation; covariance matrices; error statistics; iterative methods; message authentication; Rayleigh fading; channel estimates; channel estimation-based physical layer authentication; closed-form solution; covariance matrices; iterative algorithm; multivariate Gaussian vectors; perturbation analysis; physical layer message authentication; type I/II error probability region; Authentication; Channel estimation; Covariance matrices; Error probability; Physical layer; Vectors; Authentication; Hypothesis testing; Physical layer security; Rayleigh fading channels; hypothesis testing; physical layer security;
Journal_Title :
Information Forensics and Security, IEEE Transactions on
DOI :
10.1109/TIFS.2015.2392565