HAPADEP: Human-Assisted Pure Audio Device Pairing
نویسندگان
چکیده
The number and diversity of electronic gadgets has been steadily increasing and they are becoming indispensable to more and more professionals and non-professionals alike. At the same time, there has been fairly little progress in secure pairing of such devices. The pairing challenge revolves around establishing on-the-fly secure communication without any trusted (onor off-line) third parties between devices that have no prior association. The main security issue is the danger of so-called Man-in-the-Middle (MiTM) attacks, whereby an adversary impersonates one of the devices by inserting itself into the pairing protocol. One basic approach to countering these MiTM attacks is to involve the user in the pairing process. Therein lies the usability challenge since it is natural to minimize user burden. Previous research yielded some interesting secure pairing techniques, some of which ask too much of the human user, while others assume availability of specialized equipment (e.g., wires, photo or video cameras) on devices. Furthermore, all prior methods assumed the existence of a common digital (humanimperceptible) communication medium, such as Infrared, 802.11 or Bluetooth. In this paper we introduce a very simple technique called HAPADEP (Human-Assisted Pure Audio Device Pairing). It places very little burden on the human user and requires no common means of electronic communication. Instead, HAPADEP uses the audio channel to exchange both data and verification information among devices. It makes secure pairing possible even if devices are equipped only with a microphone and a speaker. Despite its simplicity, a number of interesting issues arise in the design of HAPADEP. We discuss design and implementation highlights as well as usability features and limitations.
منابع مشابه
Using audio in secure device pairing
Secure pairing of electronic devices is an important issue that must be addressed in many contexts. In the absence of prior security context, the need to involve the user in the pairing process is a prominent challenge. In this paper, we investigate the use of the audio channel for human-assisted device pairing. Fist we assume a common (insecure) wireless channel between devices.We thenobviate ...
متن کاملTrace Determination of Duloxetine in Human Plasma by a Novel Ionic Liquid-Based Ultrasound-Assisted In Situ Solvent Formation Microextraction and High-Performance Liquid Chromatography
For the first time, a novel and efficient ionic liquid-based ultrasound-assisted in-situ solvent formation microextraction (IL-UA-ISFME) combined with high-performance liquid chromatography-ultraviolet detection (HPLC-UV) has been successfully developed for the determination of duloxetine (DLX) in human plasma. Herein, an environmentally-friendly hydrophobic ionic liquid (1-butyl-3-methylimidaz...
متن کاملAdhocPairing: Spontaneous audio based secure device pairing for Android mobile devices
We present an implementation of AdhocPairing, an audiobased secure pairing application for Android mobile devices. The application implements recent advances in audio-based pairing utilising Fuzzy cryptography. In particular, it generates audio fingerprints from ambient audio of weakly synchronised devices and extracts identical, arbitrary length secure binary keys. Synchronisation in audio sam...
متن کاملEfficient Device Pairing Using "Human-Comparable" Synchronized Audiovisual Patterns
“Pairing” is referred to as the operation of achieving authenticated key agreement between two human-operated devices over a shortor medium-range wireless communication channel (such as Bluetooth, WiFi). The devices are ad hoc in nature, i.e., they can neither be assumed to have a prior context (such as pre-shared secrets) with each other nor do they share a common trusted onor off-line authori...
متن کاملAutomated Device Pairing for Asymmetric Pairing Scenarios
“Secure Device Pairing” is the process of bootstrapping secure communication between two human-operated devices over a shortor medium-range wireless channel (such as Bluetooth, WiFi). The devices in such a scenario can neither be assumed to have a prior context with each other nor do they share a common trusted authority. However, the devices can generally be connected using auxiliary physical ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2007