27,089 Hits in 3.4 sec

Secure pairing of interface constrained devices

Claudio Soriente, Gene Tsudik, Ersin Uzun
2009 International Journal of Security and Networks (IJSN)  
We implement the concept as a suite of practical pairing protocols for interface constrained devices.  ...  Secure initial pairing of electronic gadgets is a challenging problem because of the usual lack of a common security infrastructure and the threat of so-called Man-in-the-Middle (MiTM) attacks.  ...  Acknowledgement A preliminary version of this work appeared in Soriente et al. (2007a) .  ... 
doi:10.1504/ijsn.2009.023423 fatcat:65fw2c7t65ei7bx22iwlhrvfv4

Secure Pairing of "Interface-Constrained" Devices Resistant against Rushing User Behavior [chapter]

Nitesh Saxena, Md. Borhan Uddin
2009 Lecture Notes in Computer Science  
Secure Device Pairing" is the process of bootstrapping secure communication between two devices over a short-or medium-range wireless channel (such as Bluetooth, WiFi).  ...  We present the design and usability analysis of two novel pairing methods, which are resistant to a rushing user and require only minimal device interfaces on the constrained device.  ...  We note that some prior work addresses the problem of pairing interface-constrained devices (e.g., [17] [18] ).  ... 
doi:10.1007/978-3-642-01957-9_3 fatcat:ycpogztlgzgynjwhmobtugtfgy

Application Layer Security Authentication Protocols for the Internet of Things: A Survey

Shruthi Narayanaswamy, Anitha Vijaya Kumar
2019 Advances in Science, Technology and Engineering Systems  
of communicating devices.  ...  Even though many secure classic layered security mechanisms are available for implementation, they cannot be applied on IoT devices because of the huge energy that they consume.  ...  measures @ interfaces, IoT end -node, end-device, end-gateway, no security logging, lack of granular permission model, lack of add-on password security options, lack of comprehensive security management  ... 
doi:10.25046/aj040131 fatcat:jibfkxftcvhx3cjpyo6hd23dii

Secure and Usable Out-Of-Band Channels for Ad Hoc Mobile Device Interactions [chapter]

Ronald Kainda, Ivan Flechais, A. W. Roscoe
2010 Lecture Notes in Computer Science  
Protocols for bootstrapping security in ad hoc mobile device interactions rely on users' ability to perform specific tasks such as transferring or comparing fingerprints of information between devices.  ...  This conflict between technical security and usability requires methods for transferring fingerprints between devices that maximise both to achieve acceptable effective security.  ...  Input/output constrained devices: Common device association scenarios involve a device with rich input/output interfaces and an input/output constrained device.  ... 
doi:10.1007/978-3-642-12368-9_24 fatcat:7itsn7ctwbd3xoubpfanfuabru

Improved Pairing Protocol for Bluetooth [chapter]

Dave Singelée, Bart Preneel
2006 Lecture Notes in Computer Science  
Bluetooth also has a security architecture. In this paper, we focus on the key agreement protocol, which is the most critical part of this security architecture.  ...  This improved pairing protocol can be easily extended so that it will not only solve the dependency of the keys on the PIN, but also the location privacy problem and an important Denial of Service attack  ...  on the input interface of the device).  ... 
doi:10.1007/11814764_21 fatcat:wqa77zsz4vcgtjmr57ujhrlx3i

Usable Security for an IoT OS: Integrating the Zoo of Embedded Crypto Components Below a Common API [article]

Lena Boeckmann, Peter Kietzmann, Leandro Lanzieri, Thomas Schmidt, Matthias Wählisch
2022 arXiv   pre-print
Effective security is tied to the usability of cryptographic interfaces.  ...  A thoughtful API design is challenging, and it is beneficial to re-use such an interface and to share the knowledge of programming embedded security widely.  ...  This work was partly supported by the German Federal Ministry of Education and Research BMBF within the project PIVOT.  ... 
arXiv:2208.09281v2 fatcat:ylcdyqouwnaljkoirzadc6krge

Toward Flexible Security and Trust Hardware Structures for Mobile-Portable Systems

Apostolos Fournaris
2012 IEEE Latin America Transactions  
Pairing Based protocols as the best approach toward this end.  ...  Strong security is a key requirement and as the portable system's user invests more of his privacy in his portable, mobile device by storing personal, sensitive data in it, an urgent need for protecting  ...  The presence of an ECC arithmetic framework can provide additional features to an HSM like bilinear pairing operations (Weil pairing, Tate pairing Eta pairing, Ate pairing e.t.c.).  ... 
doi:10.1109/tla.2012.6222576 fatcat:cofpxqnwdbao3llypoz6bw4jv4

Enhanced Data Transportation in Remote Locations Using UAV Aided Edge Computing

Niranjan Ravi, Mohamed El-Sharkawy
2021 Advances in Science, Technology and Engineering Systems  
The applications of this research idea targets using edge computing devices to acquire data in areas where internet connectivity is poor and regions where secured data transmission can be used along with  ...  Addition of hardware devices increases the number of connections in hardware design, leading to exposure during flight operation.  ...  Acknowledgments We would like to thank NXP, UAVCAN forums for guidance and supporting in completion of this research.  ... 
doi:10.25046/aj0602124 fatcat:3kdbg7fgejgplbvihvpsi7kp7y

Securing Personal Network clusters

Assed Jehangir, Sonia M. Heemstra de Groot
2007 2007 Third International Conference on Security and Privacy in Communications Networks and the Workshops - SecureComm 2007  
The ad-hoc makeup of clusters, coupled with the resource constrained nature of many constituent devices, makes enforcing security a challenging task.  ...  All models are designed to be suitable for resource constrained devices yet robust enough for self organization and secure communication.  ...  We envision a PN to contain a wide range of device types, from resource constrained sensors that must last months on a pair of AA batteries, to powerful devices like laptops and PDAs that are recharged  ... 
doi:10.1109/seccom.2007.4550350 dblp:conf/securecomm/JehangirG07 fatcat:jx26akvn2zerza75k4c335mrvy


Antonio L. Maia Neto, Harsh Kupwade Patil, Leonardo B. Oliveira, Artur L. F. Souza, Italo Cunha, Michele Nogueira, Ivan Oliveira Nunes, Leonardo Cotta, Nicolas Gentille, Antonio A. F. Loureiro, Diego F. Aranha
2016 Proceedings of the 14th ACM Conference on Embedded Network Sensor Systems CD-ROM - SenSys '16  
Additionally, AoT facilitates secure (in terms of stronger authentication) wireless interoperability of new and guest devices in a seamless manner.  ...  Our results indicate AoT ranges from highly efficient on resource-rich devices to affordable on resource-constrained IoT-like devices.  ...  Security for constrained devices. Before the advent of IoT, much work has been proposed for securing MANETS and sensor networks in general.  ... 
doi:10.1145/2994551.2994555 dblp:conf/sensys/NetoSCNNCGLAPO16 fatcat:o4ld54usfnah3fhwr3t7ikmqdu

Pairing devices for social interactions

Ersin Uzun, Nitesh Saxena, Arun Kumar
2011 Proceedings of the 2011 annual conference on Human factors in computing systems - CHI '11  
The process of setting up a secure communication channel between two previously unassociated devices is referred to as "Secure Device Pairing".  ...  We present a comprehensive study to identify methods suitable for social pairing, and comparatively evaluate the usability and security of these methods.  ...  Brush, Amy Karlson and Stuart Schechter for discussion related to their work on sharing of phones [14] . This work is supported in part by NSF Cybertrust grants #0831397 and #0831526.  ... 
doi:10.1145/1978942.1979282 dblp:conf/chi/UzunSK11 fatcat:ooyls4s3ijf47bfz6rldprb7ey

Using audio in secure device pairing

Michael T. Goodrich, Michael Sirivianos, John Solis, Claudio Soriente, Gene Tsudik, Ersin Uzun
2009 International Journal of Security and Networks (IJSN)  
Secure pairing of electronic devices is an important issue that must be addressed in many contexts.  ...  In the absence of prior security context, the need to involve the user in the pairing process is a prominent challenge.  ...  Preliminary results of this research appeared in Goodrich et al. (2006) . Products mentioned in this article are solely owned by their trademark owners and we claim no rights to those trademarks.  ... 
doi:10.1504/ijsn.2009.023426 fatcat:tx22bc6e6vevfkpbxojd6mcrdm

Secure Device Pairing Based on a Visual Channel: Design and Usability Study

Nitesh Saxena, Jan-Erik Ekberg, Kari Kostiainen, N. Asokan
2011 IEEE Transactions on Information Forensics and Security  
Pairing" is the establishment of authenticated key agreement between two devices over a wireless channel.  ...  down to a device whose display consists of a cheap single lightsource, such as an LED.  ...  ACKNOWLEDGEMENTS We are grateful to Adrian Perrig, who shepherded the conference version of this paper, Jonathan McCune, Markku Kylänpää, and the anonymous reviewers for their thoughtful and constructive  ... 
doi:10.1109/tifs.2010.2096217 fatcat:vvh5zbcw6fh63fkzvo4ij4cpu4

Alice Meets Bob: A Comparative Usability Study of Wireless Device Pairing Methods for a "Two-User" Setting [article]

Arun Kumar, Nitesh Saxena, Ersin Uzun
2009 arXiv   pre-print
The process of setting up a secure communication channel between two previously unassociated devices is referred to as "Secure Device Pairing".  ...  When there is no prior security context, e.g., shared secrets, common key servers or public key certificates, device pairing requires user involvement into the process.  ...  Test Devices to be Used In a single-user setting, one of the devices might be constrained in terms of input and output interfaces.  ... 
arXiv:0907.4743v1 fatcat:p7es475fcfhj3ms2fxolbtqoqq

A First Step Towards Security for Internet of Small Things

Namhi Kang
2016 International Journal of Security and Its Applications  
As a solution, this paper proposes a secure configuration (i.e., bootstrapping) scheme for resource constrained devices such as sensors or actuators.  ...  Several technologies have been proposed in the literature to support secure pairing between devices in machine to machine communication (for example, see [15] for more information).  ...  In addition, user-device interfaces of resource constrained device are not enough for doing configurations manually by person (i.e., inadequate or even no input/output equipment such as display or keyboard  ... 
doi:10.14257/ijsia.2016.10.6.02 fatcat:ml5pfiwg7jd3fpbd5kzdcxsf4e
« Previous Showing results 1 — 15 out of 27,089 results