Title :
Caveat eptor: A comparative study of secure device pairing methods
Author :
Kumar, Arun ; Saxena, Nitesh ; Tsudik, Gene ; Uzun, Ersin
Author_Institution :
Comput. Sci. & Eng. Dept., Polytech. Inst. of New York Univesity, New York, NY
Abstract :
ldquoSecure Device Pairingrdquo is the process of bootstrapping a secure channel between two previously unassociated devices over a (usually wireless) human-imperceptible communication channel. Lack of prior security context and common trust infrastructure open the door for Man-in-the-Middle (also known as Evil Twin) attacks. Mitigation of these attacks requires user involvement in the device pairing process. Prior research yielded a number of interesting methods utilizing various auxiliary human-perceptible channels, e.g., visual, acoustic or tactile. These methods engage the user in authenticating information exchanged over human-imperceptible channels, thus mitigating MiTM attacks and forming the basis for secure pairing. We present the first comprehensive comparative evaluation of notable secure device pairing methods. Our results identify methods best-suited for a given combination of devices and human abilities. This work is both important and timely, since it sheds light on usability in one of the very few settings where a wide range of users (not just specialists) are confronted with security techniques.
Keywords :
computer bootstrapping; radiocommunication; telecommunication channels; telecommunication security; Evil Twin attacks; MiTM attacks; acoustic; auxiliary human-perceptible channels; caveat emptor; device pairing process; human-imperceptible channels; human-imperceptible communication channel; information exchange authentication; man-in-the-middle attack; secure channel bootstrapping; secure device pairing methods; secure pairing; tactile; trust infrastructure; wireless communication channel; Bluetooth; Cameras; Communication system security; Computer science; Hardware; Humans; Personal digital assistants; Usability; Wireless communication; Wireless sensor networks;
Conference_Titel :
Pervasive Computing and Communications, 2009. PerCom 2009. IEEE International Conference on
Conference_Location :
Galveston, TX
Print_ISBN :
978-1-4244-3304-9
Electronic_ISBN :
978-1-4244-3304-9
DOI :
10.1109/PERCOM.2009.4912753