Authenticating Pervasive Devices with Human Protocols

12 years 8 months ago
Authenticating Pervasive Devices with Human Protocols
Forgery and counterfeiting are emerging as serious security risks in low-cost pervasive computing devices. These devices lack the computational, storage, power, and communication resources necessary for most cryptographic authentication schemes. Surprisingly, low-cost pervasive devices like Radio Frequency Identification (RFID) tags share similar capabilities with another weak computing device: people. These similarities motivate the adoption of techniques from humancomputer security to the pervasive computing setting. This paper analyzes a particular human-to-computer authentication protocol designed by Hopper and Blum (HB), and shows it to be practical for low-cost pervasive devices. We offer an improved, concrete proof of security for the HB protocol against passive adversaries. This paper also offers a new, augmented version of the HB protocol, named HB+ , that is secure against active adversaries. The HB+ protocol is a novel, symmetric authentication protocol with a simple, low...
Ari Juels, Stephen A. Weis
Added 26 Jun 2010
Updated 26 Jun 2010
Type Conference
Year 2005
Authors Ari Juels, Stephen A. Weis
Comments (0)