In this paper we consider authentication at the physical layer, in which authenticator aims distinguishing a legitimate supplicant from an attacker on basis of characteristics set parallel wireless channels, are affected by time-varying fading. Moreover, attacker's channel has spatial correlation with supplicant's one. setting, assess and compare performance achieved different approaches under ...