Supporting tangible multi-factor key exchange in households

03/25/2022
by   Thomas Lodge, et al.
0

A common approach to securing end-to-end connectivity between devices on the Internet is to utilise a cloud-based intermediary. With this reliance upon a third-party comes a set of security and privacy concerns that are difficult to mitigate. A promising new protocol, Wireguard, dispenses with the middleman to provide secure peer-to-peer communication. However, support for initial key exchange falls outside Wireguard's scope, making it potentially vulnerable to insecure out-of-band key exchange. The design of secure and usable key exchange methods is challenging, not least in domestic spaces, as they're often characterised by technically naive users in multi-occupancy environments, making them susceptible to insider and passer-by attacks (i.e.: theft, observation attacks, relay and impersonation attacks). We describe and present the results from a design ideation study that probes the use of tangible, multi-factor approaches for securing key exchange in domestic spaces. The study suggests that a home's semi-fixed features (e.g.: lamps, shelves, chairs) can be instrumented to support a promising three-factor authentication approach ('what you have, what you know and where you are') to enable key exchange solutions that are i. more secure than commonly used naive approaches and ii. desirable for end users.

READ FULL TEXT

page 4

page 5

page 6

page 7

page 9

research
03/30/2018

Network and Security Analysis of Anonymous Communication Networks

Anonymous communication networks are popular for providing a means of co...
research
05/21/2020

Authentication and Key Management Automation in Decentralized Secure Email and Messaging via Low-Entropy Secrets

We revisit the problem of entity authentication in decentralized end-to-...
research
02/14/2018

Analysing and Patching SPEKE in ISO/IEC

Simple Password Exponential Key Exchange (SPEKE) is a well-known Passwor...
research
07/19/2018

SoniControl - A Mobile Ultrasonic Firewall

The exchange of data between mobile devices in the near-ultrasonic frequ...
research
07/09/2020

Serverless Electronic Mail

We describe a simple approach to peer-to-peer electronic mail that would...
research
01/03/2018

Deep Random based Key Exchange protocol resisting unlimited MITM

We present a protocol enabling two legitimate partners sharing an initia...
research
10/04/2021

From cold resistor to secure key exchanger

Utilizing a formerly published cold resistor circuitry, a secure key exc...

Please sign up or login with your details

Forgot password? Click here to reset