Nalazite se na CroRIS probnoj okolini. Ovdje evidentirani podaci neće biti pohranjeni u Informacijskom sustavu znanosti RH. Ako je ovo greška, CroRIS produkcijskoj okolini moguće je pristupi putem poveznice www.croris.hr
izvor podataka: crosbi !

User Friendly Authentication Mechanisms in User-to- Device and Device-to-Device Interactions (CROSBI ID 384378)

Ocjenski rad | doktorska disertacija

Perković, Toni User Friendly Authentication Mechanisms in User-to- Device and Device-to-Device Interactions / Čagalj, Mario (mentor); Split, Fakultet elektrotehnike, strojarstva i brodogradnje u Splitu, . 2013

Podaci o odgovornosti

Perković, Toni

Čagalj, Mario

engleski

User Friendly Authentication Mechanisms in User-to- Device and Device-to-Device Interactions

A large number of authentication mechanisms that grant access to an information system or a service are usually too complex or incomprehensible for an end user (e.g., an invalid certificate warning). Interacting with such a large number of authentication methods (e.g., e-mails) can result in an increased user frustration and a higher probability of critical errors, making the proposed mechanisms both unusable and insecure. In the context of user-to-device authentication (e.g., user authentication on ATM, PC), we consider two types of malicious behavior. The first type deals with the problem of observation attacks in secure user-authentication protocols that exploit nonuniform human behavior. Unfortunately, such type of behavior gives the attacker opportunity to successfully mount a timing attack. This thesis presents the first public report about a successful (timing) attack on two secure authentication methods, Undercover and a US patent. The second type of malicious behavior concerns the problem of relay attack in the context of financial transactions. Inspired by the recent work of Stajano et al. [1] on unrelayable channels, in this thesis we show that a piece of paper imprinted with a secret message and appropriately folded (hence fortune cookie) can implement a weakly unrelayable channel. Concerning the user-assisted device-to-device authentication problem (e.g., setting up a secure WiFi connection, secure initialization of a relatively large number of wireless sensor networks (eHealth, Smarthome)) we designed new protocols for the initialization of multiple resource constrained wireless devices and proved their security in a formal model. We used a paradigm based on multichannel protocols in which information is transmitted over both a radio and a visible light channel (VLC). By using unidirectional error- detection codes we proved the security of our protocol in a much stronger attacker model where the VLC is semi-authentic.

Usable Security; Timing attack; Relay Attack; Multichannel Protocol; Message Authentication Protocol

nije evidentirano

nije evidentirano

nije evidentirano

nije evidentirano

nije evidentirano

nije evidentirano

Podaci o izdanju

180

03.04.2013.

obranjeno

Podaci o ustanovi koja je dodijelila akademski stupanj

Fakultet elektrotehnike, strojarstva i brodogradnje u Splitu

Split

Povezanost rada

Elektrotehnika, Računarstvo