Sciweavers

Share
JCS
2011

Authentication protocols based on low-bandwidth unspoofable channels: A comparative survey

8 years 2 months ago
Authentication protocols based on low-bandwidth unspoofable channels: A comparative survey
One of the main challenges in pervasive computing is how we can establish secure communication over an untrusted high-bandwidth network without any initial knowledge or a Public Key Infrastructure. An approach studied by a number of researchers is building security though human work creating a low-bandwidth empirical (or authentication) channel where the transmitted information is authentic and cannot be faked or modified. In this paper, we give an analytical survey of authentication protocols of this type. We start with non-interactive authentication schemes, and then move on to analyse a number of strategies used to build interactive pair-wise and group protocols that minimise the human work relative to the amount of security obtained as well as optimising the computation processing. We introduce a number of new protocols, most of which are variants on existing ones.
L. H. Nguyen, A. W. Roscoe
Added 14 May 2011
Updated 14 May 2011
Type Journal
Year 2011
Where JCS
Authors L. H. Nguyen, A. W. Roscoe
Comments (0)
books