An LDPC Code Based Physical Layer Message Authentication Scheme With Prefect Security

被引:45
作者
Chen, Dajiang [1 ]
Zhang, Ning [2 ]
Lu, Rongxing [3 ]
Fang, Xiaojie [4 ]
Zhang, Kuan [5 ]
Qin, Zhiguang [1 ]
Shen, Xuemin [6 ]
机构
[1] Univ Elect Sci & Technol China, Sch Informat & Software Engn, Chengdu 611731, Sichuan, Peoples R China
[2] Texas A&M Univ Corpus Christi, Dept Comp Sci, Corpus Christi, TX 78412 USA
[3] Univ New Brunswick, Sch Comp Sci, Fredericton, NB E3B 5A3, Canada
[4] Harbin Inst Technol, Dept Elect & Informat Engn, Harbin 150001, Heilongjiang, Peoples R China
[5] Univ Nebraska Lincoln, Dept Elect & Comp Engn, Lincoln, NE 68588 USA
[6] Univ Waterloo, Dept Elect & Comp Engn, Waterloo, ON N2L 3G1, Canada
基金
加拿大自然科学与工程研究理事会;
关键词
Physical layer security; message authentication; binary-input wiretap channel; LDPC codes; WIRE-TAP CHANNEL; KEY GENERATION; POLAR CODES; CAPACITY; MODEL;
D O I
10.1109/JSAC.2018.2825079
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
In this paper, we study physical layer message authentication with perfect security for wireless networks, regardless of the computational power of adversaries. Specifically, we propose an efficient and feasible authentication scheme based on low-density parity-check (LDPC) codes and is an element of-AU2 hash functions over binary-input wiretap channel. First, a multimessage authentication scheme for noiseless main channel case is presented by leveraging a novel is an element of-AU2 hash function family and the dual of large-girth LDPC codes. Concretely, the sender Alice first generates a message tag T with message M and key K by using a lightweight is an element of-AU2 hash functions; then Alice encodes T to a codeword X n with the dual of large-girth LDPC codes; finally, Alice sends ( M, X-n) to the receiver Bob noiselessly. An adversary Eve has infinite computational capacity, and he can obtain M and the output Z(n) of the BEC with input X-n. Then, an authentication scheme over binary erasure channel and binary-input wiretapper's channel is further developed, which can reduce the noisy main channel case to noiseless main channel case by leveraging public discussion. We theoretically prove that, the proposed schemes are perfect secure if the number of attacks from Eve is upper bounded by a polynomial times in terms of n. Furthermore, the simulation results are provided to demonstrate that the proposed schemes can achieve high authentication rate with low time latency.
引用
收藏
页码:748 / 761
页数:14
相关论文
共 41 条
[1]   Common randomness in information theory and cryptography - Part II: CR capacity [J].
Ahlswede, R ;
Csiszar, I .
IEEE TRANSACTIONS ON INFORMATION THEORY, 1998, 44 (01) :225-240
[2]   What Will 5G Be? [J].
Andrews, Jeffrey G. ;
Buzzi, Stefano ;
Choi, Wan ;
Hanly, Stephen V. ;
Lozano, Angel ;
Soong, Anthony C. K. ;
Zhang, Jianzhong Charlie .
IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2014, 32 (06) :1065-1082
[3]  
[Anonymous], 2016, CISC VIS NETW IND GL
[4]  
[Anonymous], 2011, Physical-layer security:from information theory to security engineering, DOI DOI 10.1017/CBO9780511977985
[5]  
Bao J., 2016, J COMMUN, V11, P255
[6]   Physical Layer Authentication over MIMO Fading Wiretap Channels [J].
Baracca, Paolo ;
Laurenti, Nicola ;
Tomasin, Stefano .
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2012, 11 (07) :2564-2573
[7]   Multi-message Authentication over Noisy Channel with Polar Codes [J].
Chen, Dajiang ;
Cheng, Nan ;
Zhang, Ning ;
Zhang, Kuan ;
Qin, Zhiguang ;
Shen, Xuemin .
2017 IEEE 14TH INTERNATIONAL CONFERENCE ON MOBILE AD HOC AND SENSOR SYSTEMS (MASS), 2017, :46-54
[8]   S2M: A Lightweight Acoustic Fingerprints-Based Wireless Device Authentication Protocol [J].
Chen, Dajiang ;
Zhang, Ning ;
Qin, Zhen ;
Mao, Xufei ;
Qin, Zhiguang ;
Shen, Xuemin ;
Li, Xiang-Yang .
IEEE INTERNET OF THINGS JOURNAL, 2017, 4 (01) :88-100
[9]  
Chen DJ, 2015, IEEE INT SYMP INFO, P2301, DOI 10.1109/ISIT.2015.7282866
[10]   SmokeGrenade: An Efficient Key Generation Protocol With Artificial Interference [J].
Chen, Dajiang ;
Qin, Zhen ;
Mao, Xufei ;
Yang, Panlong ;
Qin, Zhiguang ;
Wang, Ruijin .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2013, 8 (11) :1731-1745