Next Article in Journal
Tsallis Distribution Decorated with Log-Periodic Oscillation
Next Article in Special Issue
Comparing Security Notions of Secret Sharing Schemes
Previous Article in Journal
Robust H Finite-Time Control for Discrete Markovian Jump Systems with Disturbances of Probabilistic Distributions
Previous Article in Special Issue
Entropy-Based Characterization of Internet Background Radiation
Article Menu

Export Article

Open AccessArticle
Entropy 2015, 17(1), 368-383; doi:10.3390/e17010368

Message Authentication over Noisy Channels

1
Department of Communication Engineering, Xiamen University, Xiamen 361005, China
2
Department of Electronic Engineering, Tsinghua University, Beijing 100084, China
3
State Key Laboratory on Microwave and Digital Communications, Tsinghua University, Beijing 100084, China
4
Tsinghua National Laboratory for Information Science and Technology, Tsinghua University, Beijing 100084, China
*
Author to whom correspondence should be addressed.
Received: 15 October 2014 / Accepted: 12 January 2015 / Published: 14 January 2015
View Full-Text   |   Download PDF [766 KB, uploaded 24 February 2015]   |  

Abstract

The essence of authentication is the transmission of unique and irreproducible information. In this paper, the authentication becomes a problem of the secure transmission of the secret key over noisy channels. A general analysis and design framework for message authentication is presented based on the results of Wyner’s wiretap channel. Impersonation and substitution attacks are primarily investigated. Information-theoretic lower and upper bounds on the opponent’s success probability are derived, and the lower bound and the upper bound are shown to match. In general, the fundamental limits on message authentication over noisy channels are fully characterized. Analysis results demonstrate that introducing noisy channels is a reliable way to enhance the security of authentication. View Full-Text
Keywords: authentication; information-theoretic security; wireless communication; physical layer; wiretap channel authentication; information-theoretic security; wireless communication; physical layer; wiretap channel
Figures

This is an open access article distributed under the Creative Commons Attribution License which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. (CC BY 4.0).

Scifeed alert for new publications

Never miss any articles matching your research from any publisher
  • Get alerts for new papers matching your research
  • Find out the new papers from selected authors
  • Updated daily for 49'000+ journals and 6000+ publishers
  • Define your Scifeed now

SciFeed Share & Cite This Article

MDPI and ACS Style

Zheng, F.; Xiao, Z.; Zhou, S.; Wang, J.; Huang, L. Message Authentication over Noisy Channels. Entropy 2015, 17, 368-383.

Show more citation formats Show less citations formats

Related Articles

Article Metrics

Article Access Statistics

1

Comments

[Return to top]
Entropy EISSN 1099-4300 Published by MDPI AG, Basel, Switzerland RSS E-Mail Table of Contents Alert
Back to Top