U2Fi: A Provisioning Scheme of IoT Devices with Universal Cryptographic Tokens

06/14/2019
by   Wang Kang, et al.
0

Provisioning is the starting point of the whole life-cycle of IoT devices. The traditional provisioning methods of IoT devices are facing several issues, either about user experience or privacy harvesting. Moreover, IoT devices are vulnerable to different levels of attacks due to limited resources and long online duration. In this paper, we proposed U2Fi, a novel provisioning scheme for IoT devices. We provide a solution to make the U2F device that has been trusted by the cloud in the distribution process, via WiFi or its side channel, to provision the new IoT device. Further, subsequent device settings modification, setting update, and owner transfer can also be performed by using a U2F device that has been trusted to improve security and provide a better user experience. This could provide helpful user friendliness to some valuable new application scenarios in IoT, such as smart hotel. Users could migrate the whole authentication of smart devices into a new site by simply inserting the universal cryptographic token into the secure gateway and authorizing by pressing the user-presence button on the token. Besides, the relevant unbinding process could also be done with a single cryptographic operation signed by the cryptographic token.

READ FULL TEXT
research
12/13/2018

U-PoT: A Honeypot Framework for UPnP-Based IoT Devices

The ubiquitous nature of the IoT devices has brought serious security im...
research
04/03/2019

Leveraging Electromagnetic Side-Channel Analysis for the Investigation of IoT Devices

Internet of Things (IoT) devices have expanded the horizon of digital fo...
research
09/07/2023

Caveat (IoT) Emptor: Towards Transparency of IoT Device Presence (Full Version)

As many types of IoT devices worm their way into numerous settings and m...
research
07/13/2018

ASSURED: Architecture for Secure Software Update of Realistic Embedded Devices

Secure firmware update is an important stage in the IoT device life-cycl...
research
10/13/2022

A Tagging Solution to Discover IoT Devices in Apartments

The number of IoT devices in smart homes is increasing. This broad adopt...
research
08/29/2022

IoT Droplocks: Wireless Fingerprint Theft Using Hacked Smart Locks

Electronic locks can provide security- and convenience-enhancing feature...
research
04/08/2020

Canopy: A Verifiable Privacy-Preserving Token Ring based Communication Protocol for Smart Homes

This paper focuses on the new privacy challenges that arise in smart hom...

Please sign up or login with your details

Forgot password? Click here to reset