Options
Katerina Mitrokotsa
Title
Prof. Dr.
Last Name
Mitrokotsa
First name
Katerina
Email
katerina.mitrokotsa@unisg.ch
Phone
+41 71 224 7861
Homepage
Twitter
https://twitter.com/mitrokat
Now showing
1 - 5 of 5
-
PublicationMulti-key homomorphic authenticators(IET The Institution of Engineering and Technology, 2019-11-01)
;Fiore, Dario ;Nizzardo, LucaPagnin, ElenaType: journal articleJournal: IET Information SecurityVolume: 13Issue: 6Scopus© Citations 7 -
PublicationHB+DB: Distance bounding meets human based authentication.(Elsevier, 2018-03)
;Pagnin, Elena ;Yang, Anjia ;Hu, Qiao ;Hancke, GerhardAuthentication for resource-constrained devices is seen as one of the major challenges in current wireless communication networks. The protocol by Juels and Weis provides device authentication based on the learning parity with noise (LPN) problem and is appropriate for resource-constrained devices, but it has been shown to be vulnerable to a simple man-in-the-middle attack. Subsequent work has focused on modifying the cryptographic properties of the original protocol to mitigate this problem. We propose that this attack could be mitigated using physical layer measures from distance-bounding protocols and simple modifications to devices’ radio receivers. We take the as a reference protocol and combine it with distance-bounding techniques. This hybrid solution, the protocol is shown to provide resistance against the man-in-the-middle attacks on as a result of the additional physical-layer mechanisms. We analyze the security of the proposed protocol against active man-in-the-middle attacks and present experiments showing how it is practically possible to limit the success of a practical man-in-the-middle attack. We also briefly discuss the possibility that could provide some resistance to basic threats scenarios meant to be mitigated by distance-bounding protocols. We make a practical implementation to verify that our proposed method is feasible. Finally, we discuss a proof-of-concept channel for our scheme implemented on a platform equivalent in resources to a contactless smart card/NFC device.Type: journal articleJournal: Future Generation Computer SystemsVolume: 80Scopus© Citations 11 -
PublicationTwo-hop Distance-Bounding Protocols: Keep your Friends Close.(IEEE, 2018-07-01)
;Yang, Anjia ;Pagnin, Elena ;Hancke, Gerhard P.Wong, Duncan S.Type: journal articleJournal: IEEE Transactions on Mobile ComputingVolume: 17Issue: 7Scopus© Citations 19 -
PublicationPrivacy-preserving biometric authentication: Challenges & Directions.An emerging direction for authenticating people is the adoption of biometric authentication systems. Biometric credentials are becoming increasingly popular as a means of authenticating people due to the wide range of advantages that they provide with respect to classical authentication methods (e.g., password-based authentication). The most characteristic feature of this authentication method is the naturally strong bond between a user and her biometric credentials. This very same advantageous property, however, raises serious security and privacy concerns in case the biometric trait gets compromised. In this article, we present the most challenging issues that need to be taken into consideration when designing secure and privacy-preserving biometric authentication protocols. More precisely, we describe the main threats against privacy-preserving biometric authentication systems and give directions on possible countermeasures in order to design secure and privacy-preserving biometric authentication protocols.Type: journal articleJournal: Security and Communication NetworksVolume: 2017DOI: 10.1155/2017/7129505
Scopus© Citations 38 -
PublicationUsing Distance-Bounding Protocols to Securely Verify the Proximity of Two-Hop Neighbours.Distance-bounding protocols allow devices to cryptographically verify the physical proximity of two parties and is a prominent secure neighbour detection method. We describe how existing distance-bounding protocols could be modified to verify the proximity of both next-hop and two-hop neighbours. This approach allows a node to verify that another node is a physical next-hop neighbour, and also detects legitimate neighbours who make dishonest claims as to who their neighbours are. This approach could prevent dishonest neighbours from hoarding traffic as the result of advertising false two-hop routes.Type: journal articleJournal: IEEE Communications LettersVolume: 19Issue: 7
Scopus© Citations 11