Peripheral-Free Device Pairing by Randomly Switching Power

نویسندگان

چکیده

With the growing popularity of Internet-of-Things (IoT), a massive amount purpose-specific, heterogeneous, inexpensive devices have been deployed. To allow these to perform their duties and collaborate efficiently, designing secure dependable communication channel is necessary. Pairing, as fundamental procedure for establishing trustworthy channel, has received extensive attention from security researchers. Previous pairing protocols depend on auxiliary peripherals (e.g., displays, speakers) share secret message, while those products featuring with low-price, manufacturers would probably adopt insecure methods reduce cost, so may be subject various attacks. mitigate such situation, we design peripheral-free protocol, termed SwitchPairing. Our protocol only requires users connect pre-pairing same power source, then randomly presses releases switch generate shared secret. It does not require additional can defense eavesdropping replay attacks innately. We implement prototype via two CC2640R2F development boards invite volunteers participate in experiments about bench-marking usability. The result our show that fulfill efficient requirement IoT applications.

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Automated Device Pairing for Asymmetric Pairing Scenarios

“Secure Device Pairing” is the process of bootstrapping secure communication between two human-operated devices over a shortor medium-range wireless channel (such as Bluetooth, WiFi). The devices in such a scenario can neither be assumed to have a prior context with each other nor do they share a common trusted authority. However, the devices can generally be connected using auxiliary physical ...

متن کامل

Button-enabled Device Pairing

Secure initial pairing of electronic gadgets is a challenging problem, especially considering lack of any common security infrastructure. The main security issue is the threat of so-called Man-in-the-Middle (MiTM) attacks, whereby an attacker inserts itself into the pairing protocol by impersonating one of the legitimate parties. A number of interesting techniques have been proposed, all of whi...

متن کامل

Distributed H∞ filtering over randomly switching networks

The paper considers a distributed robust estimation problem over a network with randomly changing topology. The objective is to deal with these changes locally, by switching observer gains at affected nodes only. We propose sufficient conditions which guarantee a suboptimal H∞ level of disagreement of estimates in such observer networks, both in the mean-square sense and with probability 1. Whe...

متن کامل

HAPADEP: Human-Assisted Pure Audio Device Pairing

The number and diversity of electronic gadgets has been steadily increasing and they are becoming indispensable to more and more professionals and non-professionals alike. At the same time, there has been fairly little progress in secure pairing of such devices. The pairing challenge revolves around establishing on-the-fly secure communication without any trusted (onor off-line) third parties b...

متن کامل

Secure device pairing under realistic conditions

Creating a trust relationship between two devices is commonly designated as pairing protocol. This practice is essential for the security of dynamic networks as it protects against rogue device insertion. If the pairing itself is not secure all afterward security will be compromised. All existing methods require either a pre-existing secure channel between devices or a common security context (...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: IEEE Transactions on Dependable and Secure Computing

سال: 2022

ISSN: ['1941-0018', '1545-5971', '2160-9209']

DOI: https://doi.org/10.1109/tdsc.2021.3125231