4.7 Article

On Message Authentication Channel Capacity Over a Wiretap Channel

相关参考文献

注意:仅列出部分参考文献,下载原文获取全部文献信息。
Article Engineering, Electrical & Electronic

Privacy, Secrecy, and Storage With Nested Randomized Polar Subcode Constructions

Onur Guenlue et al.

Summary: This paper discusses a set of security and privacy problems that can be solved using codes under reliability and storage constraints, focusing on the secret-key agreement problem. The authors propose a random nested PSC construction that enhances the security of keys under limited storage resources. The experiments demonstrate that nested PSCs significantly improve the secret-key to storage rate ratio compared to other code constructions.

IEEE TRANSACTIONS ON COMMUNICATIONS (2022)

Article Engineering, Civil

Channel State Information-Based Cryptographic Key Generation for Intelligent Transportation Systems

Soheyb Ribouh et al.

Summary: This paper presents a novel key generation approach in a real vehicular environment based on Channel State Information (CSI), aiming to secure vehicle communications by utilizing wireless channel characteristics. By extracting bits using a new algorithm and a QAM demodulator quantizer, the method achieves better performance compared to RSS-based approaches. The generated keys have a min-entropy of approximately 70% and a key generation rate of less than 150 μs/key for key lengths ranging from 16 to 128 bits.

IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS (2021)

Article Engineering, Electrical & Electronic

Quantum PUF for Security and Trust in Quantum Computing

Koustubh Phalak et al.

Summary: Quantum computing is a promising paradigm for solving computationally intractable problems, but it also faces security threats such as issues with hardware quality and potential bugs or malicious code in workload scheduling algorithms. To address these challenges, two flavors of Quantum Physically Unclonable Function (QuPUF) have been proposed, one based on superposition and another based on decoherence.

IEEE JOURNAL ON EMERGING AND SELECTED TOPICS IN CIRCUITS AND SYSTEMS (2021)

Article Computer Science, Theory & Methods

Physical Layer Security Enhancement With Reconfigurable Intelligent Surface-Aided Networks

Jiayi Zhang et al.

Summary: Reconfigurable intelligent surface (RIS)-aided wireless communications have been studied for physical layer security, showing advantages in terms of security performance compared to traditional MIMO systems. Increasing the number of reflecting elements in RIS significantly improves security performance, while a small number of reflecting elements in RIS do not enhance system performance when NLoS path loss is small.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2021)

Article Computer Science, Theory & Methods

Robust Key Generation With Hardware Mismatch for Secure MIMO Communications

Guyue Li et al.

Summary: TB-MALA is a new method that uses two separate bands for key generation, showing robustness to imperfect channel reciprocity and resistance to nearby and MD attacks. It reduces auto-correlation of effective channels with the help of a rotation matrix.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2021)

Article Computer Science, Theory & Methods

OBFP: Optimized Blockchain-Based Fair Payment for Outsourcing Computations in Cloud Computing

Chao Lin et al.

Summary: This research explores the challenge and solution of fair payment in outsourcing computations, proposing an optimized blockchain-based fair payment system model and constructing a blockchain-based solution that does not require zero-knowledge proofs. The utility of the system is demonstrated through security analysis, performance evaluation, and comparison with existing solutions.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2021)

Article Engineering, Electrical & Electronic

Alternative Codes and Phase Rotation Extensions for Alternating Space-Time Coding-Based Physical Layer Security

Michael R. Cribbs et al.

Summary: This article proposes several extensions to an alternating ST code physical layer security scheme, including alternative orthogonal STCs, non-orthogonal and spatially-multiplexed STCs, and phase rotation algorithms. Decoding methods and security analysis are discussed, including expected eavesdropper BER and comparison of security with and without proposed PR algorithms. The PR algorithms significantly increase the complexity of exhaustive key search attacks.

IEEE OPEN JOURNAL OF THE COMMUNICATIONS SOCIETY (2021)

Article Computer Science, Theory & Methods

Physical Layer Security Aided Wireless Interference Networks in the Presence of Strong Eavesdropper Channels

Zhichao Sheng et al.

Summary: This paper investigates physical layer security in a wireless interference network with multiple eavesdroppers who have better channel conditions than legitimate users. A novel time-fraction based transmission scheme is proposed to maximize the worst users' secrecy rate by transmitting information and artificial noise within different fractions of a time slot.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2021)

Article Computer Science, Theory & Methods

Physical Layer Secure MIMO Communications Against Eavesdroppers With Arbitrary Number of Antennas

Jie Tang et al.

Summary: In this work, a practical physical layer MIMO secure communication scheme is proposed to defend against eavesdroppers with arbitrary number of antennas. The transmitter encrypts confidential information using a random binary sequence as key bits, which are mapped to legitimate receiver for decryption. Legitimate receiver obtains key bits from activated antenna indexes and decrypts the information received.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2021)

Article Computer Science, Theory & Methods

Physical-Layer Authentication Using Multiple Channel-Based Features

Ning Xie et al.

Summary: This paper proposes two multiple Channel Impulse Response (CIR) based PLA schemes to effectively overcome the limitations of prior schemes. The MCP scheme uses multiple CIRs to realize the PLA, while the EMCP scheme further improves authentication performance by exploiting the channel correlation coefficient. Rigorous performance analysis and extensive performance comparisons through simulations demonstrate that the EMCP scheme has the best authentication performance.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2021)

Article Computer Science, Hardware & Architecture

Physical Layer based Message Authentication with Secure Channel Codes

Dajiang Chen et al.

IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING (2020)

Article Computer Science, Theory & Methods

Key and Message Semantic-Security Over State-Dependent Channels

Alexander Bunin et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2020)

Article Computer Science, Theory & Methods

Constant Modulus Secure Beamforming for Multicast Massive MIMO Wiretap Channels

Qiang Li et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2020)

Article Computer Science, Theory & Methods

Physical Layer Authentication for Non-Coherent Massive SIMO-Enabled Industrial IoT Communications

Zhifang Gu et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2020)

Article Computer Science, Theory & Methods

Physical Layer Secret Key Generation in Static Environments

Nasser Aldaghri et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2020)

Article Computer Science, Theory & Methods

Generating a Binary Symmetric Channel for Wiretap Codes

Willie K. Harrison et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2019)

Article Engineering, Electrical & Electronic

An LDPC Code Based Physical Layer Message Authentication Scheme With Prefect Security

Dajiang Chen et al.

IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS (2018)

Article Computer Science, Information Systems

Keyless Authentication and Authenticated Capacity

Wenwen Tu et al.

IEEE TRANSACTIONS ON INFORMATION THEORY (2018)

Article Computer Science, Information Systems

Secure Degrees of Freedom of the Gaussian Diamond-Wiretap Channel

Si-Hyeon Lee et al.

IEEE TRANSACTIONS ON INFORMATION THEORY (2017)

Article Engineering, Electrical & Electronic

A Full-Duplex Bob in the MIMO Gaussian Wiretap Channel: Scheme and Performance

Lingxiang Li et al.

IEEE SIGNAL PROCESSING LETTERS (2016)

Article Computer Science, Information Systems

Secret-Key Agreement Over Non-Coherent Block-Fading Channels With Public Discussion

Ashish Khisti

IEEE TRANSACTIONS ON INFORMATION THEORY (2016)

Article Engineering, Electrical & Electronic

Secure Broadcasting With Imperfect Channel State Information at the Transmitter

Amal Hyadi et al.

IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS (2016)

Article Computer Science, Theory & Methods

On the Optimality of Keyless Authentication in a Noisy Model

Shaoquan Jiang

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2015)

Article Computer Science, Theory & Methods

Keyless Authentication in a Noisy Model

Shaoquan Jiang

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2014)

Article Engineering, Electrical & Electronic

Physical Layer Authentication over MIMO Fading Wiretap Channels

Paolo Baracca et al.

IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS (2012)

Article Computer Science, Theory & Methods

Strong Secrecy on the Binary Erasure Wiretap Channel Using Large-Girth LDPC Codes

Arunkumar Subramanian et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2011)

Article Computer Science, Information Systems

Authentication Over Noisy Channels

Lifeng Lai et al.

IEEE TRANSACTIONS ON INFORMATION THEORY (2009)

Article Computer Science, Information Systems

Information theoretic bounds on authentication systems in query model

Reihaneh Safavi-Naini et al.

IEEE TRANSACTIONS ON INFORMATION THEORY (2008)

Article Computer Science, Information Systems

Authentication theory and hypothesis testing

UM Maurer

IEEE TRANSACTIONS ON INFORMATION THEORY (2000)