Physical-Layer Challenge-Response Authentication With IRS and Single-Antenna Devices
Physical-Layer Challenge-Response Authentication With IRS and Single-Antenna Devices
Abstract—This paper focuses on a novel challenge-response two are consistently similar (considering that they are both
physical layer authentication (CR-PLA) mechanism for wireless affected by noise), the received message is stated as authentic,
communications. It integrates an intelligent reflecting surface otherwise, it is assumed fake. Several technologies, including
(IRS) under the control of the receiver, which operates as a
verifier for the identity of the transmitter. In CR-PLA, the verifier orthogonal frequency division multiplexing (OFDM), multiple-
randomly configures the IRS and then checks that the resulting input multiple-output (MIMO) [2], [3] and underwater acoustic
estimated channel is correspondingly modified. We address the communications [4], employed PLA, using different testing
trade-off between communication and security performance, in techniques, from Neyman-Pearson tests [5] to machine learn-
terms of average signal-to-noise ratio (SNR) and missed detection ing approaches [6]. For an overview on PLA, we refer the
(MD) probability of an impersonation attack, respectively. In
particular, we design the probability distribution of the random reader to [7], [8].
IRS configuration that maximizes the average receiver SNR under Recently, the controllable nature of wireless channels pro-
an upper bound constraint on the MD and false alarm (FA)
probabilities, for the special case where both the transmitter and
vided by new communication technologies has been exploited
the receiver are equipped with a single antenna. Numerical results for further improvement of PLA. Specifically, the propagation
demonstrate effective balancing of communication metrics and of wireless signals can be modified using intelligent reflecting
security requirements, suggesting that CR-PLA is a promising surfaces (IRSs), i.e., controllable devices, where the phase shift
solution for future secure wireless communication. introduced by each element can be changed. Indeed, when the
Index Terms—Authentication, Challenge-response, Intelligent
Reflecting Surfaces, Physical-Layer Security.
verifier controls the IRS, he can set a random configuration of
the IRS which remains secret to the attacker, and verify that
I. I NTRODUCTION the channel estimated from a received message corresponds
Establishing whether a received message truly comes from to the predicted channel according to the set configuration,
the legitimate sender or has been forged by an impersonating [9]. Such an approach provides a challenge response PLA
attacker describes the user authentication problem. If unau- (CR-PLA) mechanism, where the random configuration is the
thenticated messages are accepted, several risks might occur challenge and the predicted channel is the expected response.
that go from denial of service to privacy or the loss of control Such an approach can be applied also when other controllable
of devices, e.g., in Internet of Things (IoT) contexts. channels are available, e.g., when Bob is a drone that changes
In the literature, several authentication mechanisms have its position to pose a challenge [10].
been proposed, mostly operating at the application layer and In this paper, we aim to design the random IRS configuration
using cryptographic approaches. Here, we exploit the propa- of the CR-PLA mechanism. We focus on the simple scenario
gation characteristics of the physical channel as a signature where both the legitimate transmitter and the verifier are
of the communication link or the transmitting device, in what equipped with a single antenna, and the number of elements
is known as physical layer authentication (PLA). In [1], the in the IRS is large. First, we observe that the random IRS
basic approach is introduced: it consists of two phases, i.e., configuration affects the data rate of the communication link
the identification acquisition and the identification verification between the user equipment (UE) and base station (BS). In
phases. In the first phase, the receiver Bob (verifier) estimates particular, increasing its randomness yields in general a lower
the channel from signals transmitted by Alice (the authentic missed detection (MD) probability while also lowering the
source). Higher-layer mechanisms, e.g., based on cryptogra- communication performance. To measure the communication
phy, are used to authenticate the signals. In the second phase, performance we consider the signal-to-noise ratio (SNR) aver-
whenever Bob receives a new message, he also estimates the aged over the random IRS configuration. Then, we consider a
channel over which the transmitted signal has propagated and generalized likelihood ratio test (GLRT) at the verifier to make
compares this estimate with that in the first phase. If the the decision about the authenticity of the message and analyze
the performance of the CR-PLA scheme in terms of both false
This work has been funded in part by the European Commission through
the Horizon Europe/JU SNS project ROBUST-6G (Grant Agreement no. alarm (FA) and MD probabilities. Lastly, we design the prob-
101139068). ability distribution of the randomly selected phase shifts that
561
Authorized licensed use limited to: Somaiya University. Downloaded on March 31,2025 at 14:51:40 UTC from IEEE Xplore. Restrictions apply.
WS25 IEEE ICC 2024 Nineth Workshop on NextG (6G and beyond) Wireless Security
562
Authorized licensed use limited to: Somaiya University. Downloaded on March 31,2025 at 14:51:40 UTC from IEEE Xplore. Restrictions apply.
WS25 IEEE ICC 2024 Nineth Workshop on NextG (6G and beyond) Wireless Security
with variance Under hypothesis H1 with attack V0 , using (6) and replacing
2
σsec =E[|Hn Gn e jθn
− µsec | ] 2 (5) in (9), Ψ becomes a non-central chi-square random variable
(21) with 2 degrees of freedom and non-centrality parameter
π2 2
=1 − µ2sec =1− m , 2
16 ζ(V, Φ′ ) = 2 ||V − QAIB (Φ′ )||2 , (26)
σ
since Hn , Gn , and ejθn are independent and |Hn |, |Gn | are for a given IRS configuration Φ′ . The PMD represents the
Rayleigh variables with zero mean and variance 12 . By using CDF of this variable evaluated at τ , that is
the central limit theorem, we approximate the sum in (14) as
2
Gaussian distributed, with mean1 N µsec and variance N σsec . PMD (ζ(V, Φ′ )) = Fχ2 ,ζ(V,Φ′ ) (τ ). (27)
Therefore, the average SNR depends on m and goes to ∞ It is worth noting that the choice of τ is typically set to
as reach a desired PFA , i.e.,
2
2N 2 µ2sec τ = Fχ−1
2 ,0 (1 − PFA ), (28)
N σsec N
Ω≈ 2 2 + 2
= 2 (N µ2sec + σsec
2
)
2σB N σsec σB and the MD probability becomes
π2
N PMD (ζ(V, Φ′ )) = Fχ2 ,ζ(V,Φ′ ) (Fχ−1
= 2 (N − 1) m2 + 1 = Ω(m). (22) 2 ,0 (1 − PFA )). (29)
σB 16
In the following, we consider the average PMD , i.e., P MD =
Due to the relation between the achievable rate and the SNR, E[Fχ2 ,ζ(V,Φ′ ) (τ )], assuming that V is fixed (i.e., Eve performs
for ease of computation, we refer to the asymptotic approxi- a deterministic attack), whereas Φ′ is random. Note that the
mate average SNR Ω(m) as the communication performance. expectation is done with respect to the distribution of ϕn , n =
0, . . . , N − 1.
B. Security Performance
The two possible error events of the authentication mecha- C. Average MD Probability
nism are FAs when Bob discards a message as forged by Eve We now derive the MD probability under a specific attack by
while it is coming from Alice, and MDs when Bob accepts Eve and we express it as a function of key statistical parameters
a message coming from Eve as legitimate. Specifically, an for ϵn , similarly to what we did for the average SNR.
FA occurs when, under hypothesis b = 0, Ψ ≥ τ , whereas, Attack Strategy: Since Eve does not know the IRS
an MD occurs when, under hypothesis b = 1, Ψ < τ . As configuration, we assume here that Eve uses as attack the
security metrics of the CR-PLA mechanism, we then consider average channel seen by Bob when Alice is transmitting, i.e.,
the probabilities of FA and MD. she sets the attack channel as V0 = E[QAIB ], where the mean
In formulas, for a given Alice-IRS-Bob channel and any is evaluated with respect to the random IRS configuration. So,
configuration Φ′ , we define then the probability of FA and V0 = HE[Φ]G = HΦE[diag{ejϵn }]G = mHΦG. (30)
MD respectively as
Test Variable: Under attack V0 (12) becomes
PFA = P [Ψ ≥ τ |b̂ = 0] , (23)
δ = mHΦG − HΦ′ G + W
PMD (ζ(V, Φ′ )) = P [Ψ < τ |b̂ = 1] . (24) N −1
X
Under the legitimate condition H0 , by plugging (8) into (9), = Hn ejθn [m − ejϵn ]Gn + W. (31)
n=0
we have that Ψ becomes a central chi-square random variable
with 2 degrees of freedom and MD Probability: Under attack V0 the probability P MD
can be written as
PFA = 1 − Fχ2 ,0 (τ ), (25)
2
P MD = P 2 |δ|2 < τ , (32)
denoting with Fχ2 ,a (·) the cumulative distribution function σ
(CDF) of a non-central chi-square variable with 2 degrees of and we then investigate the statistics of each term of the sum
freedom and non-centrality parameter a. in (31) to derive an expression for P MD .
Specifically, due to the Rayleigh scenario, and from the
1 Note that for a circularly symmetric complex random variable y with non
symmetry of h pϵ , the terms in thei sum of (31) are i.i.d
zero complex mean M = Mr + jMI and real variance S 2 , the mean of |y|2
is with mean E Hn ejθn [m − ejϵn ]Gn = 0, and with real and
√ !2 √ !2 imaginary parts of the variance defined as
2 S2 2 √ 2 √ n o2
E[|M +Sw| ] = E MR + 2wR + MI + 2wI
2 S S 2 jθ n jϵn
σR = E Re Hn e [m − e ]Gn
(33)
S2
= E (m − cos ϵn )2 = −m2 + sR
= (2 + λ),
2 n o2
2|M |2
with λ = S 2 and assuming w = wR +jwI circularly symmetric complex σI2 = E Im Hn ejθn [m − ejϵn ]Gn = sI (34)
Gaussian random variable with zero mean and unitary variance.
563
Authorized licensed use limited to: Somaiya University. Downloaded on March 31,2025 at 14:51:40 UTC from IEEE Xplore. Restrictions apply.
WS25 IEEE ICC 2024 Nineth Workshop on NextG (6G and beyond) Wireless Security
ing cross-correlation is
h n o 0.25
E Re Hn ejθn m − ejϵn Gn ×
n oi
Im Hn ejθn m − ejϵn Gn
(35) 0.2
564
Authorized licensed use limited to: Somaiya University. Downloaded on March 31,2025 at 14:51:40 UTC from IEEE Xplore. Restrictions apply.
WS25 IEEE ICC 2024 Nineth Workshop on NextG (6G and beyond) Wireless Security
0.15
0.4
0.3
0.1
0.2
Fig. 3. P MD (m, sR , τ ) contour plot at levels T , the area defining the pairs 26 27 28 29 30 31 32
(m, sR ) such m2 < sR ≤ m (in red), the area representing the feasible
solutions of (40) (in grey), and the optimal (m⋆ , s⋆R ) (stars). The different
colors refer to the different considered η ∈ T . Fig. 4. P MD (m⋆ , s⋆R , τ ) as a function of Ω(m⋆ ) for P FA ∈
{10−4 , 10−3 , 10−2 10−1 }, N = 100, and σB 2 = 0.6
565
Authorized licensed use limited to: Somaiya University. Downloaded on March 31,2025 at 14:51:40 UTC from IEEE Xplore. Restrictions apply.