Expected loss analysis for authentication in constrained channels.
Journal
Journal of Computer Security
Type
journal article
Date Issued
2015
Author(s)
Abstract
We derive bounds on the expected loss for authentication protocols in channels which are constrained due to noisy conditions and communication costs. This is motivated by a number of authentication protocols, where at least some part of the authentication is performed during a phase, lasting n rounds, with no error correction. This requires assigning an acceptable threshold for the number of detected errors and taking into account the cost of incorrect authentication and of communication. This paper describes a framework enabling an expected loss analysis for all the protocols in this family. Computationally simple methods to obtain nearly optimal values for the threshold, as well as for the number of rounds are suggested and upper bounds on the expected loss, holding uniformly, are given. These bounds are tight, as shown by a matching lower bound. Finally, a method to adaptively select both the number of rounds and the threshold is proposed for a certain class of protocols.
Language
English
Keywords
Authentication
decision theory
distance bounding
expected loss
noise
HSG Classification
contribution to scientific community
Refereed
Yes
Publisher
IOS Press
Volume
23
Number
3
Start page
309
End page
329
Pages
21
Subject(s)
Division(s)
Eprints ID
262943
File(s)
Loading...
open.access
Name
JCS521.pdf
Size
353.51 KB
Format
Adobe PDF
Checksum (MD5)
58b62f1f5b3521541fb2cb91602f7420