Secure Device Pairing Methods: An Overview
Journal Title: International Journal of Advanced Computer Science & Applications - Year 2017, Vol 8, Issue 9
Abstract
The procedure of setting up a secure communication channel among unfamiliar human-operated devices is called “Secure Device Pairing”. Secure binding of electronic devices is a challenging task because there are no security measures and commonly trusted infrastructure. It opens up the doors for many security threats and attacks e.g. man in middle and evil twin attacks. In order to mitigate these attacks different techniques have been proposed; some level of user participation is required in decreasing attacks in the device pairing process. A comparative and comprehensive evaluation of prominent secure device pairing methods is described here. The main motive of this research is to summarize the cryptographic protocols used in pairing process and compare the existing methods to secure the pairing devices. That will help in selecting best method according to the situation, as the most popular or easy method, instead they choose different methods in different circumstances.
Authors and Affiliations
Aatifah Noureen, Umar Shoaib, Muhammad Shahzad Sarfraz
Cervical Cancer Prediction through Different Screening Methods using Data Mining
Cervical cancer remains an important reason of deaths worldwide because effective access to cervical screening methods is a big challenge. Data mining techniques including decision tree algorithms are used in biomedical...
EEBFTC: Extended Energy Balanced with Fault Tolerance Capability Protocol for WSN
This paper proposes a new framework for wireless sensor networks (WSN) by combining two routing protocol algorithms. In the proposed framework two algorithms are taking into consideration the energy balanced clustering (...
Multi Factor Authentication for Student and Staff Access Control
This paper proposes a model to improve security, by controlling who accesses the University of Zambia Campus, Student Hostels and Offices. The proposed model combines Barcode, RFID, and Biometrics Technology to automatic...
A Reliable Security Model Irrespective of Energy Constraints in Wireless Sensor Networks
Wireless Sensor Networks (WSNs) are one of the most exciting and challenging research areas. It is an emerging technology that shows various applications both for public and military purpose. In order to operate th...
Mobile Agent Platform based Wallet for Preventing Double Spending in Offline e-Cash
Electronic cash (or e-cash) research has been going on for more than three decades since it was first proposed. Various schemes and methods are proposed to improve privacy and secu-rity in e-cash, but there is one securi...