Broadcasting into the uncertainty: Authentication and confidentiality by physical-layer processing

E Jorswieck, S Tomasin, A Sezgin - Proceedings of the IEEE, 2015 - ieeexplore.ieee.org
The wireless medium offers many opportunities for broadcast communications. However, it
also opens the possibility for attackers to eavesdrop the broadcast data or to pretend to be …

Physical layer based message authentication with secure channel codes

D Chen, N Zhang, N Cheng, K Zhang… - IEEE Transactions on …, 2018 - ieeexplore.ieee.org
In this paper, we investigate physical (PHY) layer message authentication to combat
adversaries with infinite computational capacity. Specifically, a PHY-layer authentication …

On message authentication channel capacity over a wiretap channel

D Chen, S Jiang, N Zhang, L Liu… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
In this paper, a novel message authentication model using the same key over wiretap
channel is proposed to achieve information-theoretic security. Specifically, in the proposed …

An LDPC code based physical layer message authentication scheme with prefect security

D Chen, N Zhang, R Lu, X Fang… - IEEE Journal on …, 2018 - ieeexplore.ieee.org
In this paper, we study physical layer message authentication with perfect security for
wireless networks, regardless of the computational power of adversaries. Specifically, we …

Analysis of channel-based user authentication by key-less and key-based approaches

S Tomasin - IEEE Transactions on Wireless Communications, 2018 - ieeexplore.ieee.org
User authentication (UA) supports the receiver in deciding whether a message comes from
either the claimed transmitter or an impersonating attacker. Information-theoretically secure …

Energy-based anchor node selection for IoT physical layer authentication

G Caparra, M Centenaro, N Laurenti… - 2016 IEEE …, 2016 - ieeexplore.ieee.org
We consider a cellular Internet of things (CIoT) network where many source nodes aim at
exchanging messages with a single concentrator node. To this end, they are assisted by …

Keyless authentication in the presence of a simultaneously transmitting adversary

E Graves, P Yu, P Spasojevic - 2016 IEEE Information Theory …, 2016 - ieeexplore.ieee.org
If Alice must communicate with Bob over a channel shared with the adversarial Eve, then
Bob must be able to validate the authenticity of the message. In particular we consider the …

A study on the concept of using efficient lightweight hash chain to improve authentication in VMF military standard

D Kim, S Seo, H Kim, WG Lim, YK Lee - Applied Sciences, 2020 - mdpi.com
Authentication algorithms in the form of cryptographic schemes, such as the Secure Hash
Algorithm 1 (SHA-1) and the digital signature algorithm (DSA), specified in the current …

Byzantine Multiple Access Channels—Part II: Communication With Adversary Identification

N Sangwan, M Bakshi, BK Dey… - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
We introduce the problem of determining the identity of a byzantine user (internal adversary)
in a communication system. We consider a two-user discrete memoryless multiple access …

On the optimality of keyless authentication in a noisy model

S Jiang - IEEE Transactions on Information Forensics and …, 2015 - ieeexplore.ieee.org
We further study the keyless authentication problem in a noisy model in our previous work,
where no secret setup is available for sender Alice and receiver Bob while there is discrete …