RF Fingerprinting to Detect Beamstealing Attacks in mmWave 5G Communications
Loading...
Date
Authors
Advisor
Referee
Mark
Journal Title
Journal ISSN
Volume Title
Publisher
Radioengineering Society
ORCID
Altmetrics
Abstract
5G mmWave networks rely on directional beamforming to ensure high-bandwidth connectivity, but the initial beam alignment process is vulnerable to beam-stealing attacks. In this scenario, an adversary transmits forged synchronization signals to hijack the receiver's connection, potentially leading to denial of service. This paper analyzes these threats and proposes a physical-layer detection mechanism based on radio frequency fingerprinting. Using a 60 GHz laboratory test-bed, we emulate legitimate and malicious transmission scenarios to evaluate specific hardware impairments. We investigate two primary detection metrics: power amplifier nonlinearities, analyzed via their Amplitude Modulation to Amplitude Modulation (AM/AM) characteristics, and local oscillator stability, quantified by carrier frequency offset drift. Experimental results demonstrate that these metrics can successfully distinguish among different transmitting devices based on their saturation levels and frequency stability profiles. The study confirms that lightweight radio frequency (RF) fingerprinting is a viable solution for hardening 5G beam management against spoofing.
Description
Keywords
Citation
Radioengineering. 2026 vol. 35, iss. 1, p. 129-136. ISSN 1210-2512
https://www.radioeng.cz/fulltexts/2026/26_01_0129_0136.pdf
https://www.radioeng.cz/fulltexts/2026/26_01_0129_0136.pdf
Document type
Published version
Document version
Final Published Version
Date of access to the full text
Language of document
en
Study field
Comittee
Date of acceptance
Defence
Result of defence
Collections
Endorsement
Review
Supplemented By
Referenced By
Creative Commons license
Except where otherwised noted, this item's license is described as Creative Commons Attribution 4.0 International license

