2019 53rd Annual Conference on Information Sciences and Systems (CISS) 2019
DOI: 10.1109/ciss.2019.8693051
|View full text |Cite
|
Sign up to set email alerts
|

Physical Layer Authentication via Fingerprint Embedding: Min-Entropy Analysis : Invited Presentation

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
4
1
1

Relationship

0
6

Authors

Journals

citations
Cited by 8 publications
(5 citation statements)
references
References 14 publications
0
5
0
Order By: Relevance
“…In the conventional strategy, the tag power is fixed as 0.015 and only φ varies, which is adopted in [12], [15]. First of all, we can observe that the authentication probability (P D ) is the same by the proposed fixed ψ strategy in Fig.…”
Section: Numerical Resultsmentioning
confidence: 91%
See 2 more Smart Citations
“…In the conventional strategy, the tag power is fixed as 0.015 and only φ varies, which is adopted in [12], [15]. First of all, we can observe that the authentication probability (P D ) is the same by the proposed fixed ψ strategy in Fig.…”
Section: Numerical Resultsmentioning
confidence: 91%
“…the mean in both hypotheses only depends on the length of sequence L t , and L t is constant in the power allocation strategy. The second term and third term in parentheses in (15) can be regarded as zero, since multi-user precoder eliminates the effect of other users' channel and AN precoder is null to users' channel. Then, the variance in (15) can be approximated as…”
Section: A Analysis Of Authentication Probabilitymentioning
confidence: 99%
See 1 more Smart Citation
“…Suppose the adversary can eavesdrop some information O about the key K. The conditional min-entropy, H ∞ (K|O), is adopted to indicate the remaining uncertainty. Given an observation o, the probability of adversaries successfully obtaining the key using the maximum likelihood decoder on the first try is [46]:…”
Section: Security Evaluation For the Probing Phase Of The Key Generat...mentioning
confidence: 99%
“…Min entropy has been used in studies related to cryptographic primitives, such as hash functions [ 19 , 20 ], in developing cryptographic hardware such as PUFs (physically unclonable functions) [ 21 ], and in authentication [ 22 , 23 ] and secret sharing [ 24 ].…”
Section: Entropy Measures and Related Conceptsmentioning
confidence: 99%