Secure pairing of interface constrained devices
نویسندگان
چکیده
Secure initial pairing of electronic gadgets is a challenging problem because of the usual lack of a common security infrastructure and the threat of so-called Man-in-the-Middle (MiTM) attacks. A number of techniques have been proposed to address the problem, butmany are not applicable to devices lacking required interfaces, such as displays or speakers. In this paper, we introduce a new secure device pairing concept that involves using the human body either as the communicationmedium for – or the source of – the common secret.We implement the concept as a suite of practical pairing protocols for interface constrained devices.
منابع مشابه
Secure Pairing of "Interface-Constrained" Devices Resistant against Rushing User Behavior
“Secure Device Pairing” is the process of bootstrapping secure communication between two devices over a shortor medium-range wireless channel (such as Bluetooth, WiFi). The devices in such a scenario can neither be assumed to have a prior context with each other nor do they share a common trusted authority. Fortunately, the devices can generally be connected using auxiliary physical channel(s) ...
متن کاملButton-enabled Device Pairing
Secure initial pairing of electronic gadgets is a challenging problem, especially considering lack of any common security infrastructure. The main security issue is the threat of so-called Man-in-the-Middle (MiTM) attacks, whereby an attacker inserts itself into the pairing protocol by impersonating one of the legitimate parties. A number of interesting techniques have been proposed, all of whi...
متن کاملButton-enabled Device Association
Secure initial pairing of electronic gadgets is a challenging problem because of the usual lack of a common security infrastructure and the threat of so-called Man-in-theMiddle (MiTM) attacks, whereby an attacker inserts itself into the pairing protocol by impersonating one of the legitimate parties. A number of interesting techniques have been proposed, all of which involve the user in the pai...
متن کاملPSIM: A tool for analysis of device pairing methods
Wireless networks are a common place nowadays and almost all of the modern devices support wireless communication in some form. These networks differ from more traditional computing systems due to the ad-hoc and spontaneous nature of interactions among devices. These systems are prone to security risks, such as eavesdropping and require different techniques as compared to traditional security m...
متن کاملSSM: Secure Service Manager for the Internet of Things
Internet of Things (IoT) has attracted attention in various fields where small devices such as sensors and actuators are intended to be connected with each other by using TCP/IP protocols. To build value-added services in such fields, security is one of the most important considerations. The IETF standard group has proposed to use the DTLS protocol to provide security services with constrained ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- IJSN
دوره 4 شماره
صفحات -
تاریخ انتشار 2009