Physical Layer Authentication via Fingerprint Embedding: Min-Entropy Analysis : Invited Presentation

One of the difficulties of implementing and analyzing algorithms that achieve information theoretic limits is adapting asymptotic results to the finite block-length regime. Results on secrecy for both regimes utilize Shannon entropy and mutual information as metrics for security. In this paper, we determine that Shannon entropy does not necessarily have equal utility for wireless authentication in finite block-length regimes with a focus on the fingerprint embedding framework. Then, we apply a new security performance metric to the framework that is linked to min-entropy rather than Shannon entropy and is similar to cheating probability used in the literature. The metric is based upon an adversary’s ability to correctly guess the secret key over many observations using maximum likelihood decoding. We demonstrate the effect that system parameters such as the length of the key and the identification tag have on an adversary’s ability to attack successfully. We find that if given a large key, it is better to use it all at once, than to use some and then renew the key with the remaining bits after a certain number of transmissions.

[1]  Ueli Maurer,et al.  Authentication theory and hypothesis testing , 2000, IEEE Trans. Inf. Theory.

[2]  Brian M. Sadler,et al.  Physical Layer Authentication via Fingerprint Embedding Using Software-Defined Radios , 2015, IEEE Access.

[3]  Geoffrey Smith,et al.  On the Foundations of Quantitative Information Flow , 2009, FoSSaCS.

[4]  Cong Ling,et al.  Artificial-Noise-Aided Message Authentication Codes With Information-Theoretic Security , 2015, IEEE Transactions on Information Forensics and Security.

[5]  Geoffrey Smith,et al.  Min-entropy as a resource , 2013, Inf. Comput..

[6]  Christian Cachin,et al.  Entropy measures and unconditional security in cryptography , 1997 .

[7]  Gustavus J. Simmons,et al.  Authentication Theory/Coding Theory , 1985, CRYPTO.

[8]  A. Rényi On Measures of Entropy and Information , 1961 .

[9]  A. D. Wyner,et al.  The wire-tap channel , 1975, The Bell System Technical Journal.

[10]  Serge Fehr,et al.  On the Conditional Rényi Entropy , 2014, IEEE Transactions on Information Theory.

[11]  Imre Csiszár,et al.  Broadcast channels with confidential messages , 1978, IEEE Trans. Inf. Theory.

[12]  John S. Baras,et al.  Fingerprinting by Design: Embedding and Authentication , 2016, Digital Fingerprinting.

[13]  Peter Elias,et al.  List decoding for noisy channels , 1957 .

[14]  Claude E. Shannon,et al.  Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..

[15]  O. Collins,et al.  A comparison of known codes, random codes, and the best codes , 1998, Proceedings. 1998 IEEE International Symposium on Information Theory (Cat. No.98CH36252).

[16]  H. Vincent Poor,et al.  Authentication Over Noisy Channels , 2008, IEEE Transactions on Information Theory.

[17]  Rick S. Blum,et al.  Inner Bound for the Capacity Region of Noisy Channels with an Authentication Requirement , 2018, 2018 IEEE International Symposium on Information Theory (ISIT).