Next Article in Journal
Tsallis Distribution Decorated with Log-Periodic Oscillation
Next Article in Special Issue
Comparing Security Notions of Secret Sharing Schemes
Previous Article in Journal
Robust H Finite-Time Control for Discrete Markovian Jump Systems with Disturbances of Probabilistic Distributions
Previous Article in Special Issue
Entropy-Based Characterization of Internet Background Radiation
Article Menu

Export Article

Open AccessArticle
Entropy 2015, 17(1), 368-383;

Message Authentication over Noisy Channels

Department of Communication Engineering, Xiamen University, Xiamen 361005, China
Department of Electronic Engineering, Tsinghua University, Beijing 100084, China
State Key Laboratory on Microwave and Digital Communications, Tsinghua University, Beijing 100084, China
Tsinghua National Laboratory for Information Science and Technology, Tsinghua University, Beijing 100084, China
Author to whom correspondence should be addressed.
Received: 15 October 2014 / Accepted: 12 January 2015 / Published: 14 January 2015
Full-Text   |   PDF [766 KB, uploaded 24 February 2015]   |  


The essence of authentication is the transmission of unique and irreproducible information. In this paper, the authentication becomes a problem of the secure transmission of the secret key over noisy channels. A general analysis and design framework for message authentication is presented based on the results of Wyner’s wiretap channel. Impersonation and substitution attacks are primarily investigated. Information-theoretic lower and upper bounds on the opponent’s success probability are derived, and the lower bound and the upper bound are shown to match. In general, the fundamental limits on message authentication over noisy channels are fully characterized. Analysis results demonstrate that introducing noisy channels is a reliable way to enhance the security of authentication. View Full-Text
Keywords: authentication; information-theoretic security; wireless communication; physical layer; wiretap channel authentication; information-theoretic security; wireless communication; physical layer; wiretap channel

Graphical abstract

This is an open access article distributed under the Creative Commons Attribution License which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited (CC BY 4.0).

Share & Cite This Article

MDPI and ACS Style

Zheng, F.; Xiao, Z.; Zhou, S.; Wang, J.; Huang, L. Message Authentication over Noisy Channels. Entropy 2015, 17, 368-383.

Show more citation formats Show less citations formats

Related Articles

Article Metrics

Article Access Statistics



[Return to top]
Entropy EISSN 1099-4300 Published by MDPI AG, Basel, Switzerland RSS E-Mail Table of Contents Alert
Back to Top