Khalfaoui et al., 2021 - Google Patents
Security Analysis of Out‐of‐Band Device Pairing Protocols: A SurveyKhalfaoui et al., 2021
View PDF- Document ID
- 7561718641022563405
- Author
- Khalfaoui S
- Leneutre J
- Villard A
- Ma J
- Urien P
- Publication year
- Publication venue
- Wireless Communications and Mobile Computing
External Links
Snippet
Numerous secure device pairing (SDP) protocols have been proposed to establish a secure communication between unidentified IoT devices that have no preshared security parameters due to the scalability requirements imposed by the ubiquitous nature of the IoT …
- 238000004458 analytical method 0 title abstract description 55
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3226—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
- H04L9/3231—Biological data, e.g. fingerprint, voice or retina
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0838—Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these
- H04L9/0841—Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these involving Diffie-Hellman or related key agreement protocols
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3271—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using challenge-response
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/80—Wireless
- H04L2209/805—Lightweight hardware, e.g. radio-frequency identification [RFID] or sensor
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W12/00—Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
- H04W12/06—Authentication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W84/00—Network topologies
- H04W84/18—Self-organizing networks, e.g. ad-hoc networks or sensor networks
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Fomichev et al. | Survey and systematization of secure device pairing | |
Mall et al. | PUF-based authentication and key agreement protocols for IoT, WSNs, and smart grids: A comprehensive survey | |
Lounis et al. | Attacks and defenses in short-range wireless technologies for IoT | |
Francis et al. | Practical NFC peer-to-peer relay attack using mobile phones | |
McCune et al. | Seeing-is-believing: Using camera phones for human-verifiable authentication | |
Odelu et al. | SEAP: Secure and efficient authentication protocol for NFC applications using pseudonyms | |
US8429405B2 (en) | System and method for human assisted secure information exchange | |
CN110572804B (en) | Bluetooth communication authentication request, receiving and communication method, mobile terminal and equipment terminal | |
Haataja et al. | Bluetooth security attacks: comparative analysis, attacks, and countermeasures | |
Srinivas et al. | Provably secure biometric based authentication and key agreement protocol for wireless sensor networks | |
Čapkun et al. | Integrity codes: Message integrity protection and authentication over insecure channels | |
Khan et al. | [Retracted] A Robust and Privacy‐Preserving Anonymous User Authentication Scheme for Public Cloud Server | |
Lo et al. | BLE-based authentication protocol for micropayment using wearable device | |
WO2015019821A1 (en) | Information processing device, information processing method, and computer program | |
Hu et al. | Tangible security: Survey of methods supporting secure ad-hoc connects of edge devices with physical context | |
Suomalainen et al. | Standards for security associations in personal networks: a comparative analysis | |
Varmedal et al. | The offpad: Requirements and usage | |
Khalfaoui et al. | Security Analysis of Out‐of‐Band Device Pairing Protocols: A Survey | |
Mayrhofer et al. | Security by spatial reference: Using relative positioning to authenticate devices for spontaneous interaction | |
Kovačević et al. | Flashing displays: user‐friendly solution for bootstrapping secure associations between multiple constrained wireless devices | |
Ghose et al. | {HELP}:{Helper-Enabled}{In-Band} Device Pairing Resistant Against Signal Cancellation | |
Haataja | New efficient intrusion detection and prevention system for Bluetooth networks | |
Mayrhofer et al. | Spontaneous mobile device authentication based on sensor data | |
Das | An efficient and novel three-factor user authentication scheme for large-scale heterogeneous wireless sensor networks | |
Karlsson et al. | Grouping-proof-distance-bounding protocols: Keep all your friends close |