Date: 2015/8/27
Place: Collaboration Room #7 16:00 - 17:30
Name: Dr. Katerina Mitrokotsa
Associate Professor, Chalmers University of Technology, Sweden
Title: Authentication in Constrained Settings:challenges and directions
Wireless communications technologies have received great attention in
recent years, mainly due to the evolution of wireless networking and
mobile computing hardware and their broad applicability. However, their
inherent vulnerabilities have serious security and privacy implications.
In this talk, we will discuss authentication in wireless communications
which is often performed in: i) noisy conditions, ii) hostile
environments and iii) constrained settings. By noisy conditions, we
refer to noise in the communication channel that may lead to
modification of the transmitted information. By hostile environments we
mainly refer to environments where attackers may attempt to impersonate
legitimate users, while by constrained settings we refer to environments
that may include communication among wireless devices with limited
resources. We have extensively investigated a family of authentication
protocols called distance bounding protocols that can be employed as the
main countermeasure against relay attacks. We analyse the security of
such protocols and we discuss the main challenges of designing efficient
and secure distance-bounding protocols. The authentication problem will
also be connected to the need of privacy-preservation of a prover's
locatio.
[back]