Proceedings of the 5th Symposium on Usable Privacy and Security 2009
DOI: 10.1145/1572532.1572547
|View full text |Cite
|
Sign up to set email alerts
|

Usability and security of out-of-band channels in secure device pairing protocols

Abstract: Initiating and bootstrapping secure, yet low-cost, ad-hoc transactions is an important challenge that needs to be overcome if the promise of mobile and pervasive computing is to be fulfilled. For example, mobile payment applications would benefit from the ability to pair devices securely without resorting to conventional mechanisms such as shared secrets, a Public Key Infrastructure (PKI), or trusted third parties. A number of methods have been proposed for doing this based on the use of a secondary out-of-ban… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
89
0

Year Published

2010
2010
2021
2021

Publication Types

Select...
7

Relationship

2
5

Authors

Journals

citations
Cited by 90 publications
(89 citation statements)
references
References 22 publications
(29 reference statements)
0
89
0
Order By: Relevance
“…The aim of the study was not only to evaluate how usable the methods are but also compare our results with those previous studies. To this regard, we designed our laboratory experiment similarly to [7,8,9].…”
Section: Usability Evaluation Of the Methodsmentioning
confidence: 99%
See 2 more Smart Citations
“…The aim of the study was not only to evaluate how usable the methods are but also compare our results with those previous studies. To this regard, we designed our laboratory experiment similarly to [7,8,9].…”
Section: Usability Evaluation Of the Methodsmentioning
confidence: 99%
“…Currently proposed OOB channels force one to choose between security and usability. Compare and confirm has been found both a usable and preferred method but also susceptible to security failures [7,8,9]. Other methods such as timing and auxiliary device methods are also susceptible to security failures though they do not offer the same level of usability as compare and confirm.…”
Section: Limitationsmentioning
confidence: 99%
See 1 more Smart Citation
“…In any case we believe that the use of HISPs in payments should usually be backed up by secondary security as discussed later. 6 digits happens to be the number used in the experiments reported in [35]. 7 A user may simply keep pressing the OK button regardless of what displayed on the mobile phone.…”
Section: The Human Contributionmentioning
confidence: 99%
“…7 A user may simply keep pressing the OK button regardless of what displayed on the mobile phone. 8 [35] examines ways of performing this comparison and conclusively demonstrates that for security the best approach is for the customer to type the digits of the merchant's digest value into mobile phone, which then compares the two.…”
Section: The Human Contributionmentioning
confidence: 99%