Peripheral-free Device Pairing by Randomly Switching Power

02/26/2020
by   Zhijian Shao, et al.
0

The popularity of Internet-of-Things (IoT) comes with security concerns. Attacks against wireless communication venues of IoT (e.g., Man-in-the-Middle attacks) have grown at an alarming rate over the past decade. Pairing, which allows the establishment of the secure communicating channels for IoT devices without a prior relationship, is thus a paramount capability. Existing secure pairing protocols require auxiliary equipment/peripheral (e.g., displays, speakers and sensors) to achieve authentication, which is unacceptable for low-priced devices such as smart lamps. This paper studies how to design a peripheral-free secure pairing protocol. Concretely, we design the protocol, termed SwitchPairing, via out-of-box power supplying chargers and on-board clocks, achieving security and economics at the same time. When a user wants to pair two or more devices, he/she connects the pairing devices to the same power source, and presses/releases the switch on/off button several times. Then, the press and release timing can be used to derive symmetric keys. We implement a prototype via two CC2640R2F development boards from Texas Instruments (TI) due to its prevalence. Extensive experiments and user studies are also conducted to benchmark our protocol in terms of efficiency and security.

READ FULL TEXT

page 8

page 13

page 14

research
02/04/2020

Public-Key Based Authentication Architecture for IoT Devices Using PUF

Nowadays, Internet of Things (IoT) is a trending topic in the computing ...
research
07/25/2019

On The Fly Diffie Hellman for IoT

The Internet of Things (IoT) is a fast growing field of devices being ad...
research
09/24/2020

BLURtooth: Exploiting Cross-Transport Key Derivation in Bluetooth Classic and Bluetooth Low Energy

The Bluetooth standard specifies two incompatible wireless transports: B...
research
08/16/2020

Efficient, Flexible and Secure Group Key Management Protocol for Dynamic IoT Settings

Many Internet of Things (IoT) scenarios require communication to and dat...
research
02/22/2021

InaudibleKey: Generic Inaudible Acoustic Signal based Key Agreement Protocol for Mobile Devices

Secure Device-to-Device (D2D) communication is becoming increasingly imp...
research
07/27/2018

SecuCode: Intrinsic PUF Entangled Secure Wireless Code Dissemination for Computational RFID Devices

The simplicity of deployment and perpetual operation of energy harvestin...
research
10/18/2020

Spectrum-Flexible Secure Broadcast Ranging

Secure ranging is poised to play a critical role in several emerging app...

Please sign up or login with your details

Forgot password? Click here to reset