Security Analysis of Out-of-Band Device Pairing Protocols: A Survey

Numerous secure device pairing (SDP) protocols have been proposed to establish a secure communication between unidentified IoT devices that have no preshared security parameters due to the scalability requirements imposed by the ubiquitous nature of the IoT devices. In order to provide the most user...

Full description

Bibliographic Details
Main Authors: Sameh Khalfaoui, Jean Leneutre, Arthur Villard, Jingxuan Ma, Pascal Urien
Format: Article
Language:English
Published: Hindawi-Wiley 2021-01-01
Series:Wireless Communications and Mobile Computing
Online Access:http://dx.doi.org/10.1155/2021/8887472
id doaj-63fc0af30e164c11a63468d5a8751ab2
record_format Article
spelling doaj-63fc0af30e164c11a63468d5a8751ab22021-02-15T12:52:48ZengHindawi-WileyWireless Communications and Mobile Computing1530-86691530-86772021-01-01202110.1155/2021/88874728887472Security Analysis of Out-of-Band Device Pairing Protocols: A SurveySameh Khalfaoui0Jean Leneutre1Arthur Villard2Jingxuan Ma3Pascal Urien4LTCI, Télécom Paris, Institut Polytechnique de Paris, FranceLTCI, Télécom Paris, Institut Polytechnique de Paris, FranceEDF R&D, FranceEDF R&D, FranceLTCI, Télécom Paris, Institut Polytechnique de Paris, FranceNumerous secure device pairing (SDP) protocols have been proposed to establish a secure communication between unidentified IoT devices that have no preshared security parameters due to the scalability requirements imposed by the ubiquitous nature of the IoT devices. In order to provide the most user-friendly IoT services, the usability assessment has become the main requirement. Thus, the complete security analysis has been replaced by a sketch of a proof to partially validate the robustness of the proposal. The few existing formal or computational security verifications on the SDP schemes have been conducted based on the assessment of a wide variety of uniquely defined security properties. Therefore, the security comparison between these protocols is not feasible and there is a lack of a unified security analysis framework to assess these pairing techniques. In this paper, we survey a selection of secure device pairing proposals that have been formally or computationally verified. We present a systematic description of the protocol assumptions, the adopted verification model, and an assessment of the verification results. In addition, we normalize the used taxonomy in order to enhance the understanding of these security validations. Furthermore, we refine the adversary capabilities on the out-of-band channel by redefining the replay capability and by introducing a new notion of delay that is dependent on the protocol structure that is more adequate for the ad hoc pairing context. Also, we propose a classification of a number of out-of-band channels based on their security properties and under our refined adversary model. Our work motivates the future SDP protocol designer to conduct a formal or a computational security assessment to allow the comparability between these pairing techniques. Furthermore, it provides a realistic abstraction of the adversary capabilities on the out-of-band channel which improves the modeling of their security characteristics in the protocol verification tools.http://dx.doi.org/10.1155/2021/8887472
collection DOAJ
language English
format Article
sources DOAJ
author Sameh Khalfaoui
Jean Leneutre
Arthur Villard
Jingxuan Ma
Pascal Urien
spellingShingle Sameh Khalfaoui
Jean Leneutre
Arthur Villard
Jingxuan Ma
Pascal Urien
Security Analysis of Out-of-Band Device Pairing Protocols: A Survey
Wireless Communications and Mobile Computing
author_facet Sameh Khalfaoui
Jean Leneutre
Arthur Villard
Jingxuan Ma
Pascal Urien
author_sort Sameh Khalfaoui
title Security Analysis of Out-of-Band Device Pairing Protocols: A Survey
title_short Security Analysis of Out-of-Band Device Pairing Protocols: A Survey
title_full Security Analysis of Out-of-Band Device Pairing Protocols: A Survey
title_fullStr Security Analysis of Out-of-Band Device Pairing Protocols: A Survey
title_full_unstemmed Security Analysis of Out-of-Band Device Pairing Protocols: A Survey
title_sort security analysis of out-of-band device pairing protocols: a survey
publisher Hindawi-Wiley
series Wireless Communications and Mobile Computing
issn 1530-8669
1530-8677
publishDate 2021-01-01
description Numerous secure device pairing (SDP) protocols have been proposed to establish a secure communication between unidentified IoT devices that have no preshared security parameters due to the scalability requirements imposed by the ubiquitous nature of the IoT devices. In order to provide the most user-friendly IoT services, the usability assessment has become the main requirement. Thus, the complete security analysis has been replaced by a sketch of a proof to partially validate the robustness of the proposal. The few existing formal or computational security verifications on the SDP schemes have been conducted based on the assessment of a wide variety of uniquely defined security properties. Therefore, the security comparison between these protocols is not feasible and there is a lack of a unified security analysis framework to assess these pairing techniques. In this paper, we survey a selection of secure device pairing proposals that have been formally or computationally verified. We present a systematic description of the protocol assumptions, the adopted verification model, and an assessment of the verification results. In addition, we normalize the used taxonomy in order to enhance the understanding of these security validations. Furthermore, we refine the adversary capabilities on the out-of-band channel by redefining the replay capability and by introducing a new notion of delay that is dependent on the protocol structure that is more adequate for the ad hoc pairing context. Also, we propose a classification of a number of out-of-band channels based on their security properties and under our refined adversary model. Our work motivates the future SDP protocol designer to conduct a formal or a computational security assessment to allow the comparability between these pairing techniques. Furthermore, it provides a realistic abstraction of the adversary capabilities on the out-of-band channel which improves the modeling of their security characteristics in the protocol verification tools.
url http://dx.doi.org/10.1155/2021/8887472
work_keys_str_mv AT samehkhalfaoui securityanalysisofoutofbanddevicepairingprotocolsasurvey
AT jeanleneutre securityanalysisofoutofbanddevicepairingprotocolsasurvey
AT arthurvillard securityanalysisofoutofbanddevicepairingprotocolsasurvey
AT jingxuanma securityanalysisofoutofbanddevicepairingprotocolsasurvey
AT pascalurien securityanalysisofoutofbanddevicepairingprotocolsasurvey
_version_ 1714867143380566016