Button-enabled Device Pairing
نویسنده
چکیده
Secure initial pairing of electronic gadgets is a challenging problem, especially considering lack of any common security infrastructure. The main security issue is the threat of so-called Man-in-the-Middle (MiTM) attacks, whereby an attacker inserts itself into the pairing protocol by impersonating one of the legitimate parties. A number of interesting techniques have been proposed, all of which involve the user in the pairing process. However, they are inapplicable to many common scenarios where devices to-be-paired do not possess required interfaces, such as displays, speakers, cameras or microphones. In this paper, we introduce BEDA (Button-Enabled Device Association), a protocol suite for secure pairing devices with minimal user interfaces. The most common and minimal interface available on wide variety of devices is a single button. BEDA protocols can accommodate pairing scenarios where one (or even both) devices only have a single button as their “user interface”. Our usability study demonstrates that BEDA protocols involve very little human burden and are quite suitable for ordinary users.
منابع مشابه
Button-enabled Device Association
Secure initial pairing of electronic gadgets is a challenging problem because of the usual lack of a common security infrastructure and the threat of so-called Man-in-theMiddle (MiTM) attacks, whereby an attacker inserts itself into the pairing protocol by impersonating one of the legitimate parties. A number of interesting techniques have been proposed, all of which involve the user in the pai...
متن کاملBeyond Device Pairing: New Interactions on NFC Enabled Mobile Phones
Near field communication (NFC) is a short-range wireless protocol that allows users to connect devices and access content and services by simply holding enabled devices near each other. Many of the existing applications (ticketing, purchasing, device configuration, etc.) use NFC as a method to transfer unique identifiers which then inform a larger system. While useful, these applications do not...
متن کاملSecure device pairing under realistic conditions
Creating a trust relationship between two devices is commonly designated as pairing protocol. This practice is essential for the security of dynamic networks as it protects against rogue device insertion. If the pairing itself is not secure all afterward security will be compromised. All existing methods require either a pre-existing secure channel between devices or a common security context (...
متن کاملPairing-Based Cryptography for Sensor Networks
Pairing-based Cryptography has enabled a wide range of cryptographic schemes. This work discusses these schemes in the context of wireless sensor networks. To our knowledge, ours is the first work to address this subject.
متن کاملDesign and Impressions of a Multi-User Tabletop Interaction Device
TableMouse is a cursor manipulation device designed specifically for multiple users interacting on large tabletop surface. TableMouse tracks position, height, orientation, button state, and unique identification. It is designed using infrared light emitting diodes and computer vision to perform device tracking and identification. This paper explores the functional design of such a device. Insig...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2007