Proceedings of the 19th Annual International Conference on Mobile Systems, Applications, and Services 2021
DOI: 10.1145/3458864.3467883
|View full text |Cite
|
Sign up to set email alerts
|

FastZIP

Abstract: With the advent of the Internet of Things (IoT), establishing a secure channel between smart devices becomes crucial. Recent research proposes zero-interaction pairing (ZIP), which enables pairing without user assistance by utilizing devices' physical context (e.g., ambient audio) to obtain a shared secret key. The state-of-the-art ZIP schemes suffer from three limitations: (1) prolonged pairing time (i.e., minutes or hours), (2) vulnerability to brute-force offline attacks on a shared key, and (3) susceptibil… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
5
0

Year Published

2022
2022
2023
2023

Publication Types

Select...
6

Relationship

0
6

Authors

Journals

citations
Cited by 11 publications
(5 citation statements)
references
References 28 publications
0
5
0
Order By: Relevance
“…We assume that the adversary knows how the proposed secret key establishment works, however she cannot be within the target vehicle during the key establishment process. We note that this is a common assumption in other context-based secret key establishment schemes [11], [6], [16], where a moving vehicle provides a physical security boundary. Instead, the adversary attempts to observe the target vehicle's velocity from outside of the target vehicle to get the same key as the legitimate devices.…”
Section: Adversary Modelmentioning
confidence: 86%
See 4 more Smart Citations
“…We assume that the adversary knows how the proposed secret key establishment works, however she cannot be within the target vehicle during the key establishment process. We note that this is a common assumption in other context-based secret key establishment schemes [11], [6], [16], where a moving vehicle provides a physical security boundary. Instead, the adversary attempts to observe the target vehicle's velocity from outside of the target vehicle to get the same key as the legitimate devices.…”
Section: Adversary Modelmentioning
confidence: 86%
“…The IMU-based device pairing schemes for vehicular environments [6], [16] extract secret keys from the vehicle movement or environmental changes obtained from IMU sensor readings. However, they introduce two limitations: (1) As IMU sensor data can be easily interfered with by device movement or orientations, they require the legitimate devices to be fixed (e.g., taping the devices) inside of the vehicle.…”
Section: B Context-based Secret Key Establishmentmentioning
confidence: 99%
See 3 more Smart Citations