COOB: Hybrid Secure Device Pairing Scheme in a Hostile Environment

被引:1
作者
Khalfaoui, Sameh [1 ,2 ]
Leneutre, Jean [2 ]
Villard, Arthur [1 ]
Ma, Jingxuan [1 ]
Urien, Pascal [2 ]
机构
[1] EDF R&D, 7 Blvd Gaspard Monge, F-91120 Palaiseau, France
[2] Inst Polytech Paris, Telecom Paris, LTCI, Paris, France
来源
SECURITY AND PRIVACY IN COMMUNICATION NETWORKS (SECURECOMM 2020), PT II | 2020年 / 336卷
关键词
Internet of Things; Security; Secure device pairing; Out-of-band channel; Context-based pairing; Formal methods;
D O I
10.1007/978-3-030-63095-9_27
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Due to the scalability limitations, the secure device pairing of Internet of Things objects cannot be efficiently conducted based on traditional cryptographic techniques using a pre-shared security knowledge. The use of Out-of-Band (OoB) channels has been proposed as a way to authenticate the key establishment process but they require a relatively long time and an extensive user involvement to transfer the authentication bits. However, the context-based schemes exploit the randomness of the ambient environment to extract a common secret without an extensive user intervention under the requirement of having a secure perimeter during the extraction phase, which is considered as a strong security assumption. In this paper, we introduce a novel hybrid scheme, called COOB, that efficiently combines a state-of-the-art fast context-based encoder with our Out-of-Band based scheme. This protocol exploits a nonce exponentiation to achieve the temporary secrecy goal needed for the authentication. Our method provides security against an attacker that can violate the secure perimeter requirement, which is not supported by the existing contextual schemes. This security improvement has been formally validated in the symbolic model using the TAMARIN prover. Based on our implementation of the Out-of-Band channel, COOB enhances the usability by reducing the pairing time up to 39% for an 80-bit OoB exchange while keeping an optimal protocol cost.
引用
收藏
页码:419 / 438
页数:20
相关论文
共 36 条
[1]   Can You Get into the Middle of Near Field Communication? [J].
Akter, Sajeda ;
Chakraborty, Tusher ;
Khan, Taslim Arefin ;
Chellappan, Sriram ;
Al Islam, A. B. M. Alim .
2017 IEEE 42ND CONFERENCE ON LOCAL COMPUTER NETWORKS (LCN), 2017, :365-373
[2]  
Alliance for Responsible Mining (ARM), 2014, FAIRM STAND VERS 2 0
[3]  
[Anonymous], 2011, P 9 INT C MOB SYST A
[4]  
[Anonymous], 2016, BLUETOOTH CORE SPECI
[5]  
Balfanz D., 2002, NDSS CIT
[6]  
Brown D.R, 2010, STANDARDS EFFICIENT, V1
[7]  
BURROWS M, 1990, ACM T COMPUT SYST, V8, P18, DOI [10.1145/77648.77649, 10.1145/74851.74852]
[8]  
Claycomb W., 2011, J INTERNET SERVICES, V1, P86
[9]   NEW DIRECTIONS IN CRYPTOGRAPHY [J].
DIFFIE, W ;
HELLMAN, ME .
IEEE TRANSACTIONS ON INFORMATION THEORY, 1976, 22 (06) :644-654
[10]   ON THE SECURITY OF PUBLIC KEY PROTOCOLS [J].
DOLEV, D ;
YAO, AC .
IEEE TRANSACTIONS ON INFORMATION THEORY, 1983, 29 (02) :198-208