IRMA-International.org: Creator of Knowledge
Information Resources Management Association
Advancing the Concepts & Practices of Information Resources Management in Modern Organizations

Principles of Soft Verification

Principles of Soft Verification
View Sample PDF
Author(s): Natasa Zivic (Department Electrical Engineering and Computer Science, Institute for Digital Communications Systems, University of Siegen, Siegen, Germany)
Copyright: 2013
Volume: 4
Issue: 1
Pages: 15
Source title: International Journal of Distributed Systems and Technologies (IJDST)
Editor(s)-in-Chief: Nik Bessis (Edge Hill University, UK)
DOI: 10.4018/jdst.2013010101

Purchase

View Principles of Soft Verification on the publisher's website for pricing and purchasing information.

Abstract

This paper considers messages protected with the Message Authentication Code (MAC) for the sake of authenticity. The standard forward error correcting channel code is assumed, which reduces the error rate, but no repeat mechanism exists to correct the remaining errors. The uncorrected errors cause the rejection of messages with a wrong MAC, as a successful MAC verification (“hard” verification) demands errorless message and errorless MAC. This paper introduces the extension of “hard” verification of MACs, whose result is “true” or “false”, to “soft” verification, that outputs additionally a trust level as verification result. This allows the acceptance of corrected messages and their MACs, even if a few bits of the MAC are different from the expected value. The costs are a loss of trust, as trust is defined for the successful standard or “hard” verification, i.e. for errorless message and its MAC. Therefore “Trust Output” is accompanied with the output of the verification process. A definition of “Trust Level” will be given, together with an algorithm of “soft” verification, which provides such Trust Output. This algorithm is based on a Soft Output channel decoder, which provides a reliability value for each bit, which is used as soft input for the proposed algorithm, “Soft Input Trust Output”. Simulation results show an essential improvement of the acceptance rate of MACs - at the cost of a reduced trust level. The reduction can be calculated and the maximum permitted reduction of the trust level can be preset.

Related Content

Honglong Xu, Zhonghao Liang, Kaide Huang, Guoshun Huang, Yan He. © 2024. 17 pages.
Sherin Eliyas, P. Ranjana. © 2024. 10 pages.
Shuang Li, Xiaoguo Yao. © 2024. 16 pages.
Jialan Sun. © 2024. 21 pages.
Mei Gong, Bingli Mo. © 2024. 15 pages.
Qian He, Ke Wang. © 2024. 19 pages.
Sunil Kumar, Rashmi Mishra, Tanvi Jain, Achyut Shankar. © 2024. 12 pages.
Body Bottom