Security Analysis of Out-of-Band Device Pairing Protocols: A Survey
Numerous secure device pairing (SDP) protocols have been proposed to establish a secure communication between unidentified IoT devices that have no preshared security parameters due to the scalability requirements imposed by the ubiquitous nature of the IoT devices. In order to provide the most user...
Main Authors: | , , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
Hindawi-Wiley
2021-01-01
|
Series: | Wireless Communications and Mobile Computing |
Online Access: | http://dx.doi.org/10.1155/2021/8887472 |
id |
doaj-63fc0af30e164c11a63468d5a8751ab2 |
---|---|
record_format |
Article |
spelling |
doaj-63fc0af30e164c11a63468d5a8751ab22021-02-15T12:52:48ZengHindawi-WileyWireless Communications and Mobile Computing1530-86691530-86772021-01-01202110.1155/2021/88874728887472Security Analysis of Out-of-Band Device Pairing Protocols: A SurveySameh Khalfaoui0Jean Leneutre1Arthur Villard2Jingxuan Ma3Pascal Urien4LTCI, Télécom Paris, Institut Polytechnique de Paris, FranceLTCI, Télécom Paris, Institut Polytechnique de Paris, FranceEDF R&D, FranceEDF R&D, FranceLTCI, Télécom Paris, Institut Polytechnique de Paris, FranceNumerous secure device pairing (SDP) protocols have been proposed to establish a secure communication between unidentified IoT devices that have no preshared security parameters due to the scalability requirements imposed by the ubiquitous nature of the IoT devices. In order to provide the most user-friendly IoT services, the usability assessment has become the main requirement. Thus, the complete security analysis has been replaced by a sketch of a proof to partially validate the robustness of the proposal. The few existing formal or computational security verifications on the SDP schemes have been conducted based on the assessment of a wide variety of uniquely defined security properties. Therefore, the security comparison between these protocols is not feasible and there is a lack of a unified security analysis framework to assess these pairing techniques. In this paper, we survey a selection of secure device pairing proposals that have been formally or computationally verified. We present a systematic description of the protocol assumptions, the adopted verification model, and an assessment of the verification results. In addition, we normalize the used taxonomy in order to enhance the understanding of these security validations. Furthermore, we refine the adversary capabilities on the out-of-band channel by redefining the replay capability and by introducing a new notion of delay that is dependent on the protocol structure that is more adequate for the ad hoc pairing context. Also, we propose a classification of a number of out-of-band channels based on their security properties and under our refined adversary model. Our work motivates the future SDP protocol designer to conduct a formal or a computational security assessment to allow the comparability between these pairing techniques. Furthermore, it provides a realistic abstraction of the adversary capabilities on the out-of-band channel which improves the modeling of their security characteristics in the protocol verification tools.http://dx.doi.org/10.1155/2021/8887472 |
collection |
DOAJ |
language |
English |
format |
Article |
sources |
DOAJ |
author |
Sameh Khalfaoui Jean Leneutre Arthur Villard Jingxuan Ma Pascal Urien |
spellingShingle |
Sameh Khalfaoui Jean Leneutre Arthur Villard Jingxuan Ma Pascal Urien Security Analysis of Out-of-Band Device Pairing Protocols: A Survey Wireless Communications and Mobile Computing |
author_facet |
Sameh Khalfaoui Jean Leneutre Arthur Villard Jingxuan Ma Pascal Urien |
author_sort |
Sameh Khalfaoui |
title |
Security Analysis of Out-of-Band Device Pairing Protocols: A Survey |
title_short |
Security Analysis of Out-of-Band Device Pairing Protocols: A Survey |
title_full |
Security Analysis of Out-of-Band Device Pairing Protocols: A Survey |
title_fullStr |
Security Analysis of Out-of-Band Device Pairing Protocols: A Survey |
title_full_unstemmed |
Security Analysis of Out-of-Band Device Pairing Protocols: A Survey |
title_sort |
security analysis of out-of-band device pairing protocols: a survey |
publisher |
Hindawi-Wiley |
series |
Wireless Communications and Mobile Computing |
issn |
1530-8669 1530-8677 |
publishDate |
2021-01-01 |
description |
Numerous secure device pairing (SDP) protocols have been proposed to establish a secure communication between unidentified IoT devices that have no preshared security parameters due to the scalability requirements imposed by the ubiquitous nature of the IoT devices. In order to provide the most user-friendly IoT services, the usability assessment has become the main requirement. Thus, the complete security analysis has been replaced by a sketch of a proof to partially validate the robustness of the proposal. The few existing formal or computational security verifications on the SDP schemes have been conducted based on the assessment of a wide variety of uniquely defined security properties. Therefore, the security comparison between these protocols is not feasible and there is a lack of a unified security analysis framework to assess these pairing techniques. In this paper, we survey a selection of secure device pairing proposals that have been formally or computationally verified. We present a systematic description of the protocol assumptions, the adopted verification model, and an assessment of the verification results. In addition, we normalize the used taxonomy in order to enhance the understanding of these security validations. Furthermore, we refine the adversary capabilities on the out-of-band channel by redefining the replay capability and by introducing a new notion of delay that is dependent on the protocol structure that is more adequate for the ad hoc pairing context. Also, we propose a classification of a number of out-of-band channels based on their security properties and under our refined adversary model. Our work motivates the future SDP protocol designer to conduct a formal or a computational security assessment to allow the comparability between these pairing techniques. Furthermore, it provides a realistic abstraction of the adversary capabilities on the out-of-band channel which improves the modeling of their security characteristics in the protocol verification tools. |
url |
http://dx.doi.org/10.1155/2021/8887472 |
work_keys_str_mv |
AT samehkhalfaoui securityanalysisofoutofbanddevicepairingprotocolsasurvey AT jeanleneutre securityanalysisofoutofbanddevicepairingprotocolsasurvey AT arthurvillard securityanalysisofoutofbanddevicepairingprotocolsasurvey AT jingxuanma securityanalysisofoutofbanddevicepairingprotocolsasurvey AT pascalurien securityanalysisofoutofbanddevicepairingprotocolsasurvey |
_version_ |
1714867143380566016 |