Security Analysis of Out-of-Band Device Pairing Protocols: A Survey

被引:2
|
作者
Khalfaoui, Sameh [1 ,2 ]
Leneutre, Jean [1 ]
Villard, Arthur [2 ]
Ma, Jingxuan [2 ]
Urien, Pascal [1 ]
机构
[1] Inst Polytech Paris, Telecom Paris, LTCI, Paris, France
[2] EDF R&D, Paris, France
关键词
SENSOR NETWORKS; KEY AGREEMENT; AUTHENTICATION; CHANNELS; ATTACK;
D O I
10.1155/2021/8887472
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Numerous secure device pairing (SDP) protocols have been proposed to establish a secure communication between unidentified IoT devices that have no preshared security parameters due to the scalability requirements imposed by the ubiquitous nature of the IoT devices. In order to provide the most user-friendly IoT services, the usability assessment has become the main requirement. Thus, the complete security analysis has been replaced by a sketch of a proof to partially validate the robustness of the proposal. The few existing formal or computational security verifications on the SDP schemes have been conducted based on the assessment of a wide variety of uniquely defined security properties. Therefore, the security comparison between these protocols is not feasible and there is a lack of a unified security analysis framework to assess these pairing techniques. In this paper, we survey a selection of secure device pairing proposals that have been formally or computationally verified. We present a systematic description of the protocol assumptions, the adopted verification model, and an assessment of the verification results. In addition, we normalize the used taxonomy in order to enhance the understanding of these security validations. Furthermore, we refine the adversary capabilities on the out-of-band channel by redefining the replay capability and by introducing a new notion of delay that is dependent on the protocol structure that is more adequate for the ad hoc pairing context. Also, we propose a classification of a number of out-of-band channels based on their security properties and under our refined adversary model. Our work motivates the future SDP protocol designer to conduct a formal or a computational security assessment to allow the comparability between these pairing techniques. Furthermore, it provides a realistic abstraction of the adversary capabilities on the out-of-band channel which improves the modeling of their security characteristics in the protocol verification tools.
引用
收藏
页数:30
相关论文
共 50 条
  • [21] Survey on out-of-band failure localization in all-optical mesh networks
    Tapolcai, Janos
    TELECOMMUNICATION SYSTEMS, 2014, 56 (01) : 169 - 176
  • [22] Interference Channel With an Out-of-Band Relay
    Sahin, Onur
    Simeone, Osvaldo
    Erkip, Elza
    IEEE TRANSACTIONS ON INFORMATION THEORY, 2011, 57 (05) : 2746 - 2764
  • [23] Out-of-Band Characteristics of the Panel Antenna
    Siden, S. V.
    2016 II INTERNATIONAL YOUNG SCIENTISTS FORUM ON APPLIED PHYSICS AND ENGINEERING (YSF), 2016, : 65 - 68
  • [24] ENVELOPE DELAY FOR OUT-OF-BAND SIGNALS
    DELGUERCIO, J
    PROCEEDINGS OF THE IEEE, 1964, 52 (09) : 1066 - &
  • [25] A persistent out-of-band virtualization system
    Department of Computer Science and Technology, Tsinghua University, Beijing 100084, China
    Jisuanji Yanjiu yu Fazhan, 2006, 10 (1842-1848):
  • [27] Autofocusing With Out-of-Band Phase Conjugation
    Cheong, YeonJoon
    Shorter, K. Alex
    Popa, Bogdan-Ioan
    IEEE ANTENNAS AND WIRELESS PROPAGATION LETTERS, 2019, 18 (01): : 118 - 122
  • [28] On Antenna Array Out-of-Band Emissions
    Anttila, Lauri
    Brihuega, Alberto
    Valkama, Mikko
    IEEE WIRELESS COMMUNICATIONS LETTERS, 2019, 8 (06) : 1653 - 1656
  • [29] Gesture Input as an Out-of-band Channel
    Chagnaadorj, Oyuntungalag
    Tanaka, Jiro
    JOURNAL OF INFORMATION PROCESSING SYSTEMS, 2014, 10 (01): : 92 - 102
  • [30] Analysis and design of a wide stop-band and high out-of-band suppression BPF
    Guo, Gui-Qiang
    Liu, Hao
    Su, Guo-Dong
    Liu, Jun
    Wang, Junchao
    Sun, Lingling
    MICROWAVE AND OPTICAL TECHNOLOGY LETTERS, 2024, 66 (04)