DocumentCode :
31977
Title :
Secure Device Pairing: A Survey
Author :
Mirzadeh, Shahab ; Cruickshank, Haitham ; Tafazolli, Rahim
Author_Institution :
Centre for Commun. Syst. Res. (CCSR), Univ. of Surrey, Guildford, UK
Volume :
16
Issue :
1
fYear :
2014
fDate :
First Quarter 2014
Firstpage :
17
Lastpage :
40
Abstract :
In this paper, we discuss secure device pairing mechanisms in detail. We explain man-in-the-middle attack problem in unauthenticated Diffie-Hellman key agreement protocols and show how it can be solved by using out-of-band channels in the authentication procedure. We categorize out-of-band channels into three categories of weak, public, and private channels and demonstrate their properties through some familiar scenarios. A wide range of current device pairing mechanisms are studied and their design circumstances, problems, and security issues are explained. We also study group device pairing mechanisms and discuss their application in constructing authenticated group key agreement protocols. We divide the mechanisms into two categories of protocols with and without the trusted leader and show that protocols with trusted leader are more communication and computation efficient. In our study, we considered both insider and outsider adversaries and present protocols that provide secure group device pairing for uncompromised nodes even in presence of corrupted group members.
Keywords :
cryptographic protocols; authenticated group key agreement protocol; authentication procedure; device pairing mechanism; man-in-the-middle attack problem; out-of-band channel; private channel; public channel; unauthenticated Diffie-Hellman key agreement protocols; Authentication; DH-HEMTs; Protocols; Public key; Wireless communication; key management; machine-to-machine communication; pervasive computing; security;
fLanguage :
English
Journal_Title :
Communications Surveys & Tutorials, IEEE
Publisher :
ieee
ISSN :
1553-877X
Type :
jour
DOI :
10.1109/SURV.2013.111413.00196
Filename :
6687314
Link To Document :
بازگشت