2021
DOI: 10.1155/2021/8887472
|View full text |Cite
|
Sign up to set email alerts
|

Security Analysis of Out‐of‐Band Device Pairing Protocols: A Survey

Abstract: Numerous secure device pairing (SDP) protocols have been proposed to establish a secure communication between unidentified IoT devices that have no preshared security parameters due to the scalability requirements imposed by the ubiquitous nature of the IoT devices. In order to provide the most user-friendly IoT services, the usability assessment has become the main requirement. Thus, the complete security analysis has been replaced by a sketch of a proof to partially validate the robustness of the proposal. T… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
2
1
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(3 citation statements)
references
References 84 publications
0
3
0
Order By: Relevance
“…In order to ensure the data quality of enterprise case auxiliary decision information source, this paper first uses data cleaning technology to preprocess the data.In the process of data cleaning [21][22][23], noise data can be effectively eliminated so that the data in the data set can meet the requirements of enterprise case auxiliary decision-making. The schematic diagram of data cleaning is shown in Figure 1 below.…”
Section: Complete Data Preprocessing and Feature Engineering Based On...mentioning
confidence: 99%
“…In order to ensure the data quality of enterprise case auxiliary decision information source, this paper first uses data cleaning technology to preprocess the data.In the process of data cleaning [21][22][23], noise data can be effectively eliminated so that the data in the data set can meet the requirements of enterprise case auxiliary decision-making. The schematic diagram of data cleaning is shown in Figure 1 below.…”
Section: Complete Data Preprocessing and Feature Engineering Based On...mentioning
confidence: 99%
“…In 2015, Nguyen and Leneutre [25] proposed a lightweight scheme for device pairing with only four messages. However, a brute-force attack was found by Khalfaoui et al [26]. Later, in 2017, Taparia, Panigrahy, and Jena [27] proposed AKE based on a commitment scheme and authentication strings to withstand MITM (man-in-the-middle) attacks.…”
Section: Related Workmentioning
confidence: 99%
“…If the nonce is revealed, the attacker could obtain the value used for OOB checking in advance, rendering the protocol insecure. Therefore, their protocol cannot resist the brute-force attack [26].…”
Section: Brute-force Attackmentioning
confidence: 99%