CPL - Chalmers Publication Library
| Utbildning | Forskning | Styrkeområden | Om Chalmers | In English In English Ej inloggad.

Authentication in Constrained Settings

Aikaterini Mitrokotsa (Institutionen för data- och informationsteknik, Nätverk och system (Chalmers) )
Lecture Notes in Computer Science. Cryptography and Information Security in the Balkans (0302-9743). Vol. 9024 (2015), p. 3-12.
[Konferensbidrag, refereegranskat]

Communication technologies have revolutionized modern society. They have changed the way we do business, travel, manage our personal lives and communicate with our friends. In many cases, this crucially depends on accurate and reliable authentication. We need to get authenticated in order to get access to restricted services and/or places (i.e. transport systems, e-banking, border control). This authentication is performed in constrained settings due to: (i) privacy issues, (ii) noisy conditions, (iii) resource constraints. Privacy-preservation is essential for the protection of sensitive information (i.e. diseases, location, nationality). Noisy conditions refer to physical noise in the communication channel that may lead to modification of the transmitted information, or natural variability due to the authentication medium (e.g. fingerprint scans). Resource constraints refer to limited device power/abilities (i.e. sensors, RFID tags). It is a very challenging problem to develop privacy-preserving authentication for noisy and constrained environments that optimally balance authentication accuracy, privacypreservation and resource consumption. In this paper, we describe the main challenges of the problem of authentication in constrained settings, the current state-of-the-art of the field and possible directions of research.

Nyckelord: distance bounding protocol, biometric authentication, privacy, attacks

Denna post skapades 2015-12-07. Senast ändrad 2016-08-22.
CPL Pubid: 227473


Läs direkt!

Länk till annan sajt (kan kräva inloggning)