MIMO Beam Signature Detection for 5G based on Machine Learning
DOI:
https://doi.org/10.14209/jcis.2025.9Keywords:
Deep Learning, 5G, Cybersecurity, Physical LayerAbstract
This paper explores the application of deep learning techniques to enhance physical layer security in 5G networks by detecting spoofing attacks through the analysis of MIMO beam patterns. The study focuses on developing and evaluating three machine learning models—Deep Autoencoder (DAE), Convolutional DAE, and Convolutional Neural Networks (CNNs)—to identify unique beam signatures caused by manufacturing imperfections in antenna arrays. Using datasets generated via simulations, the models are trained to distinguish legitimate devices from intruders based on their transmission beam patterns. The performance of the models is evaluated using metrics such as accuracy, precision, recall, and specificity. The results demonstrate the potential for using neural networks to implement robust security measures in 5G networks by leveraging intrinsic physical characteristics of antennas, providing a new layer of protection against unauthorized access.
Downloads
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2025 João Pedro Melquiades Gomes, Matheus Vilarim P. dos Santos, Edmar C. Gurjão (Author)

This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.
Authors who publish in this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a CC BY-NC 4.0 (Attribution-NonCommercial 4.0 International) that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this journal.
- Authors can enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgment of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) before and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).
___________
Accepted 2025-05-28
Published 2025-10-29

