DocumentCode
31977
Title
Secure Device Pairing: A Survey
Author
Mirzadeh, Shahab ; Cruickshank, Haitham ; Tafazolli, Rahim
Author_Institution
Centre for Commun. Syst. Res. (CCSR), Univ. of Surrey, Guildford, UK
Volume
16
Issue
1
fYear
2014
fDate
First Quarter 2014
Firstpage
17
Lastpage
40
Abstract
In this paper, we discuss secure device pairing mechanisms in detail. We explain man-in-the-middle attack problem in unauthenticated Diffie-Hellman key agreement protocols and show how it can be solved by using out-of-band channels in the authentication procedure. We categorize out-of-band channels into three categories of weak, public, and private channels and demonstrate their properties through some familiar scenarios. A wide range of current device pairing mechanisms are studied and their design circumstances, problems, and security issues are explained. We also study group device pairing mechanisms and discuss their application in constructing authenticated group key agreement protocols. We divide the mechanisms into two categories of protocols with and without the trusted leader and show that protocols with trusted leader are more communication and computation efficient. In our study, we considered both insider and outsider adversaries and present protocols that provide secure group device pairing for uncompromised nodes even in presence of corrupted group members.
Keywords
cryptographic protocols; authenticated group key agreement protocol; authentication procedure; device pairing mechanism; man-in-the-middle attack problem; out-of-band channel; private channel; public channel; unauthenticated Diffie-Hellman key agreement protocols; Authentication; DH-HEMTs; Protocols; Public key; Wireless communication; key management; machine-to-machine communication; pervasive computing; security;
fLanguage
English
Journal_Title
Communications Surveys & Tutorials, IEEE
Publisher
ieee
ISSN
1553-877X
Type
jour
DOI
10.1109/SURV.2013.111413.00196
Filename
6687314
Link To Document