ISR News Story
Method and Implementation for Wireless Message Authentication (ISR IP)
ISR intellectual property available to license
Inventors: John Baras, Paul Yu, Brian Sadler
The new system provides a flexible framework for describing and analyzing a large family of authentication systems built over existing transmission systems. Considering the constraints associated with sending authentication information concurrently with data without requiring extra bandwidth or transmission power, energy is allocated away from the data signal to the authentication signal, thereby increasing the probability of error of data recovery. However, with a long enough authentication code word a useful authentication system can be achieved with very slight data degradation. Additionally, by treating the authentication tag as a sequence of pilot symbols, the data recovery can actually be improved by the aware receiver. An interesting extension to the framework considers how cross-layer designs may strengthen node security. Authentication policies based on the authentication mechanism may adapt according to the environment.
For more information
ISR-IP-Baras ISR-IP-security ISR-IP-wireless-networks
June 23, 2007