2020
DOI: 10.1109/tdsc.2018.2846258
|View full text |Cite
|
Sign up to set email alerts
|

Physical Layer based Message Authentication with Secure Channel Codes

Abstract: In this paper, we investigate physical (PHY) layer message authentication to combat adversaries with infinite computational capacity. Specifically, a PHY-layer authentication framework over a wiretap channel (W 1 ,W 2) is proposed to achieve information-theoretic security with the same key. We develop a theorem to reveal the requirements/conditions for the authentication framework to be information-theoretic secure for authenticating a polynomial number of messages in terms of n. Based on this theorem, we desi… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
20
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
8
1

Relationship

0
9

Authors

Journals

citations
Cited by 50 publications
(20 citation statements)
references
References 47 publications
0
20
0
Order By: Relevance
“…With this received vector, the first step of the MRC sequence given in (19) is calculated aŝ The second step given in (20) is then used iteratively for x ∈ {1, . .…”
Section: Discussionmentioning
confidence: 99%
See 1 more Smart Citation
“…With this received vector, the first step of the MRC sequence given in (19) is calculated aŝ The second step given in (20) is then used iteratively for x ∈ {1, . .…”
Section: Discussionmentioning
confidence: 99%
“…Whereas some PLS techniques do not require any form of pre-shared secret [6], [12], there are a number of schemes that do [16]- [19]. Many PLS approaches use the channel state information (CSI), received signal strength indicator (RSSI), or other main channel statistics to establish an element of secrecy between the transmitter and intended receiver [4], [15], [20], [21].…”
Section: Introductionmentioning
confidence: 99%
“…We note that the above-mentioned implementations of the optimization problem in (11) are convex, and thus their global optimum can be obtained using standard convex optimization tools [39]. Step 1 1: Solve problem (10) Output: x CI Input: d, H, H e , γ, σ 2 z , δ, x CI ;…”
Section: ) Pls -Two-steps 6-lines Schemementioning
confidence: 99%
“…To preserve data privacy and data security, the basic way for data owner is to conduct encryption on sensitive data prior to its outsourcing. Whereas, to some extent, data encryption makes efficient data retrieval a formidable challenge [14]- [16]. A naive approach for data retrieval is to download-then-decrypt all the encrypted data locally.…”
Section: Introductionmentioning
confidence: 99%