Secure pairing of interface constrained devices

نویسندگان

  • Claudio Soriente
  • Gene Tsudik
  • Ersin Uzun
چکیده

Secure initial pairing of electronic gadgets is a challenging problem because of the usual lack of a common security infrastructure and the threat of so-called Man-in-the-Middle (MiTM) attacks. A number of techniques have been proposed to address the problem, butmany are not applicable to devices lacking required interfaces, such as displays or speakers. In this paper, we introduce a new secure device pairing concept that involves using the human body either as the communicationmedium for – or the source of – the common secret.We implement the concept as a suite of practical pairing protocols for interface constrained devices.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Secure Pairing of "Interface-Constrained" Devices Resistant against Rushing User Behavior

“Secure Device Pairing” is the process of bootstrapping secure communication between two devices over a shortor medium-range wireless channel (such as Bluetooth, WiFi). The devices in such a scenario can neither be assumed to have a prior context with each other nor do they share a common trusted authority. Fortunately, the devices can generally be connected using auxiliary physical channel(s) ...

متن کامل

Button-enabled Device Pairing

Secure initial pairing of electronic gadgets is a challenging problem, especially considering lack of any common security infrastructure. The main security issue is the threat of so-called Man-in-the-Middle (MiTM) attacks, whereby an attacker inserts itself into the pairing protocol by impersonating one of the legitimate parties. A number of interesting techniques have been proposed, all of whi...

متن کامل

Button-enabled Device Association

Secure initial pairing of electronic gadgets is a challenging problem because of the usual lack of a common security infrastructure and the threat of so-called Man-in-theMiddle (MiTM) attacks, whereby an attacker inserts itself into the pairing protocol by impersonating one of the legitimate parties. A number of interesting techniques have been proposed, all of which involve the user in the pai...

متن کامل

PSIM: A tool for analysis of device pairing methods

Wireless networks are a common place nowadays and almost all of the modern devices support wireless communication in some form. These networks differ from more traditional computing systems due to the ad-hoc and spontaneous nature of interactions among devices. These systems are prone to security risks, such as eavesdropping and require different techniques as compared to traditional security m...

متن کامل

SSM: Secure Service Manager for the Internet of Things

Internet of Things (IoT) has attracted attention in various fields where small devices such as sensors and actuators are intended to be connected with each other by using TCP/IP protocols. To build value-added services in such fields, security is one of the most important considerations. The IETF standard group has proposed to use the DTLS protocol to provide security services with constrained ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • IJSN

دوره 4  شماره 

صفحات  -

تاریخ انتشار 2009