譌・譎ゑシ壹蟷ウ謌�27蟷エ8譛�27譌・ 16譎�00蛻�-17譎�30蛻�
蝣エ謇�壹諠��ア遘大ュヲ遐皮ゥカ遘� 5髫� 繧ウ繝ゥ繝懊Ξ繝シ繧キ繝ァ繝ウ繝ォ繝シ繝�7
隰帶シ碑�ー丞錐�� Katerina Mitrokotsa
繝√Ε繝ォ繝槭�繧ケ蟾・遘大、ァ蟄ヲ�医せ繧ヲ繧ァ繝シ繝�Φ�� 蜃�蕗謗�
隰帶シ秘。檎岼�� Authentication in Constrained Settings:challenges and directions
Wireless communications technologies have received great attention in
recent years, mainly due to the evolution of wireless networking and
mobile computing hardware and their broad applicability. However, their
inherent vulnerabilities have serious security and privacy implications.
In this talk, we will discuss authentication in wireless communications
which is often performed in: i) noisy conditions, ii) hostile
environments and iii) constrained settings. By noisy conditions, we
refer to noise in the communication channel that may lead to
modification of the transmitted information. By hostile environments we
mainly refer to environments where attackers may attempt to impersonate
legitimate users, while by constrained settings we refer to environments
that may include communication among wireless devices with limited
resources. We have extensively investigated a family of authentication
protocols called distance bounding protocols that can be employed as the
main countermeasure against relay attacks. We analyse the security of
such protocols and we discuss the main challenges of designing efficient
and secure distance-bounding protocols. The authentication problem will
also be connected to the need of privacy-preservation of a prover's
locatio.
[謌サ繧犠