[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Khalfaoui et al., 2021 - Google Patents

Security Analysis of Out‐of‐Band Device Pairing Protocols: A Survey

Khalfaoui et al., 2021

View PDF @Full View
Document ID
7561718641022563405
Author
Khalfaoui S
Leneutre J
Villard A
Ma J
Urien P
Publication year
Publication venue
Wireless Communications and Mobile Computing

External Links

Snippet

Numerous secure device pairing (SDP) protocols have been proposed to establish a secure communication between unidentified IoT devices that have no preshared security parameters due to the scalability requirements imposed by the ubiquitous nature of the IoT …
Continue reading at onlinelibrary.wiley.com (PDF) (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
    • H04L9/3231Biological data, e.g. fingerprint, voice or retina
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0838Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these
    • H04L9/0841Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these involving Diffie-Hellman or related key agreement protocols
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3271Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using challenge-response
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/80Wireless
    • H04L2209/805Lightweight hardware, e.g. radio-frequency identification [RFID] or sensor
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W12/00Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
    • H04W12/06Authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W84/00Network topologies
    • H04W84/18Self-organizing networks, e.g. ad-hoc networks or sensor networks

Similar Documents

Publication Publication Date Title
Fomichev et al. Survey and systematization of secure device pairing
Mall et al. PUF-based authentication and key agreement protocols for IoT, WSNs, and smart grids: A comprehensive survey
Lounis et al. Attacks and defenses in short-range wireless technologies for IoT
Francis et al. Practical NFC peer-to-peer relay attack using mobile phones
McCune et al. Seeing-is-believing: Using camera phones for human-verifiable authentication
Odelu et al. SEAP: Secure and efficient authentication protocol for NFC applications using pseudonyms
US8429405B2 (en) System and method for human assisted secure information exchange
CN110572804B (en) Bluetooth communication authentication request, receiving and communication method, mobile terminal and equipment terminal
Haataja et al. Bluetooth security attacks: comparative analysis, attacks, and countermeasures
Srinivas et al. Provably secure biometric based authentication and key agreement protocol for wireless sensor networks
Čapkun et al. Integrity codes: Message integrity protection and authentication over insecure channels
Khan et al. [Retracted] A Robust and Privacy‐Preserving Anonymous User Authentication Scheme for Public Cloud Server
Lo et al. BLE-based authentication protocol for micropayment using wearable device
WO2015019821A1 (en) Information processing device, information processing method, and computer program
Hu et al. Tangible security: Survey of methods supporting secure ad-hoc connects of edge devices with physical context
Suomalainen et al. Standards for security associations in personal networks: a comparative analysis
Varmedal et al. The offpad: Requirements and usage
Khalfaoui et al. Security Analysis of Out‐of‐Band Device Pairing Protocols: A Survey
Mayrhofer et al. Security by spatial reference: Using relative positioning to authenticate devices for spontaneous interaction
Kovačević et al. Flashing displays: user‐friendly solution for bootstrapping secure associations between multiple constrained wireless devices
Ghose et al. {HELP}:{Helper-Enabled}{In-Band} Device Pairing Resistant Against Signal Cancellation
Haataja New efficient intrusion detection and prevention system for Bluetooth networks
Mayrhofer et al. Spontaneous mobile device authentication based on sensor data
Das An efficient and novel three-factor user authentication scheme for large-scale heterogeneous wireless sensor networks
Karlsson et al. Grouping-proof-distance-bounding protocols: Keep all your friends close