Security Analysis of Out-of-Band Device Pairing Protocols: A Survey

被引:2
|
作者
Khalfaoui, Sameh [1 ,2 ]
Leneutre, Jean [1 ]
Villard, Arthur [2 ]
Ma, Jingxuan [2 ]
Urien, Pascal [1 ]
机构
[1] Inst Polytech Paris, Telecom Paris, LTCI, Paris, France
[2] EDF R&D, Paris, France
关键词
SENSOR NETWORKS; KEY AGREEMENT; AUTHENTICATION; CHANNELS; ATTACK;
D O I
10.1155/2021/8887472
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Numerous secure device pairing (SDP) protocols have been proposed to establish a secure communication between unidentified IoT devices that have no preshared security parameters due to the scalability requirements imposed by the ubiquitous nature of the IoT devices. In order to provide the most user-friendly IoT services, the usability assessment has become the main requirement. Thus, the complete security analysis has been replaced by a sketch of a proof to partially validate the robustness of the proposal. The few existing formal or computational security verifications on the SDP schemes have been conducted based on the assessment of a wide variety of uniquely defined security properties. Therefore, the security comparison between these protocols is not feasible and there is a lack of a unified security analysis framework to assess these pairing techniques. In this paper, we survey a selection of secure device pairing proposals that have been formally or computationally verified. We present a systematic description of the protocol assumptions, the adopted verification model, and an assessment of the verification results. In addition, we normalize the used taxonomy in order to enhance the understanding of these security validations. Furthermore, we refine the adversary capabilities on the out-of-band channel by redefining the replay capability and by introducing a new notion of delay that is dependent on the protocol structure that is more adequate for the ad hoc pairing context. Also, we propose a classification of a number of out-of-band channels based on their security properties and under our refined adversary model. Our work motivates the future SDP protocol designer to conduct a formal or a computational security assessment to allow the comparability between these pairing techniques. Furthermore, it provides a realistic abstraction of the adversary capabilities on the out-of-band channel which improves the modeling of their security characteristics in the protocol verification tools.
引用
收藏
页数:30
相关论文
共 50 条
  • [1] Analysis of Out-of-Band Management Security Based on IPMI Protocol
    Xia, Hong
    Zhao, Xiongfei
    PROCEEDINGS OF THE 2017 GLOBAL CONFERENCE ON MECHANICS AND CIVIL ENGINEERING (GCMCE 2017), 2017, 132 : 102 - 106
  • [2] Evaluation of Out-of-Band Channels for IoT Security
    Latvala S.
    Sethi M.
    Aura T.
    SN Computer Science, 2020, 1 (1)
  • [3] The Security of Lazy Users in Out-of-Band Authentication
    Naor, Moni
    Rotem, Lior
    Segev, Gil
    ACM TRANSACTIONS ON PRIVACY AND SECURITY, 2020, 23 (02)
  • [4] The Security of Lazy Users in Out-of-Band Authentication
    Naor, Moni
    Rotem, Lior
    Segev, Gil
    THEORY OF CRYPTOGRAPHY, TCC 2018, PT II, 2018, 11240 : 575 - 599
  • [5] Dimensioning for in-band and out-of-band signalling protocols in OBS networks
    Pantaleo, A.
    Tornatore, M.
    Pattavina, A.
    Raffaelli, C.
    Callegati, F.
    IET COMMUNICATIONS, 2009, 3 (03) : 418 - 427
  • [6] Out-of-Band Covert Channels-A Survey
    Carrara, Brent
    Adams, Carlisle
    ACM COMPUTING SURVEYS, 2016, 49 (02)
  • [7] Checksum Gestures: Continuous Gestures as an Out-of-Band Channel for Secure Pairing
    Ahmed, Imtiaj
    Ye, Yina
    Bhattacharya, Sourav
    Asokan, N.
    Jacucci, Giulio
    Nurmi, Petteri
    Tarkoma, Sasu
    PROCEEDINGS OF THE 2015 ACM INTERNATIONAL JOINT CONFERENCE ON PERVASIVE AND UBIQUITOUS COMPUTING (UBICOMP 2015), 2015, : 391 - 401
  • [8] Rethinking IoT Security: Understanding and Mitigating Out-of-Band Vulnerabilities
    Xu, Wenyuan
    PROCEEDINGS OF THE 2023 ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, ASIA CCS 2023, 2023, : 1 - 1
  • [9] Cloud Security via Virtualized Out-of-band Execution and Obfuscation
    Mumme, Dean C.
    Wallace, Brooke
    McGraw, Robert
    2017 IEEE 10TH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING (CLOUD), 2017, : 286 - 293
  • [10] Cloud Security via Virtualized Out-of-Band Execution and Obfuscation
    Mumme, Dean C.
    Wallace, Brooke
    McGraw, Robert
    IEEE International Conference on Cloud Computing, CLOUD, 2017, 2017-June : 286 - 293