{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,24]],"date-time":"2025-08-24T01:25:18Z","timestamp":1755998718664,"version":"3.41.2"},"reference-count":104,"publisher":"Wiley","issue":"1","license":[{"start":{"date-parts":[[2021,1,30]],"date-time":"2021-01-30T00:00:00Z","timestamp":1611964800000},"content-version":"vor","delay-in-days":29,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100003032","name":"National Association for Research and Technology","doi-asserted-by":"crossref","award":["2018\/1810"],"award-info":[{"award-number":["2018\/1810"]}],"id":[{"id":"10.13039\/501100003032","id-type":"DOI","asserted-by":"crossref"}]},{"name":"SEIDO LAB","award":["2018\/1810"],"award-info":[{"award-number":["2018\/1810"]}]}],"content-domain":{"domain":["onlinelibrary.wiley.com"],"crossmark-restriction":true},"short-container-title":["Wireless Communications and Mobile Computing"],"published-print":{"date-parts":[[2021,1]]},"abstract":"<jats:p>Numerous secure device pairing (SDP) protocols have been proposed to establish a secure communication between unidentified IoT devices that have no preshared security parameters due to the scalability requirements imposed by the ubiquitous nature of the IoT devices. In order to provide the most user\u2010friendly IoT services, the usability assessment has become the main requirement. Thus, the complete security analysis has been replaced by a sketch of a proof to partially validate the robustness of the proposal. The few existing formal or computational security verifications on the SDP schemes have been conducted based on the assessment of a wide variety of uniquely defined security properties. Therefore, the security comparison between these protocols is not feasible and there is a lack of a unified security analysis framework to assess these pairing techniques. In this paper, we survey a selection of secure device pairing proposals that have been formally or computationally verified. We present a systematic description of the protocol assumptions, the adopted verification model, and an assessment of the verification results. In addition, we normalize the used taxonomy in order to enhance the understanding of these security validations. Furthermore, we refine the adversary capabilities on the out\u2010of\u2010band channel by redefining the replay capability and by introducing a new notion of delay that is dependent on the protocol structure that is more adequate for the ad hoc pairing context. Also, we propose a classification of a number of out\u2010of\u2010band channels based on their security properties and under our refined adversary model. Our work motivates the future SDP protocol designer to conduct a formal or a computational security assessment to allow the comparability between these pairing techniques. Furthermore, it provides a realistic abstraction of the adversary capabilities on the out\u2010of\u2010band channel which improves the modeling of their security characteristics in the protocol verification tools.<\/jats:p>","DOI":"10.1155\/2021\/8887472","type":"journal-article","created":{"date-parts":[[2021,1,30]],"date-time":"2021-01-30T19:05:30Z","timestamp":1612033530000},"update-policy":"https:\/\/doi.org\/10.1002\/crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Security Analysis of Out\u2010of\u2010Band Device Pairing Protocols: A Survey"],"prefix":"10.1155","volume":"2021","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-9259-7785","authenticated-orcid":false,"given":"Sameh","family":"Khalfaoui","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4810-0791","authenticated-orcid":false,"given":"Jean","family":"Leneutre","sequence":"additional","affiliation":[]},{"given":"Arthur","family":"Villard","sequence":"additional","affiliation":[]},{"given":"Jingxuan","family":"Ma","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7887-6139","authenticated-orcid":false,"given":"Pascal","family":"Urien","sequence":"additional","affiliation":[]}],"member":"311","published-online":{"date-parts":[[2021,1,30]]},"reference":[{"key":"e_1_2_11_1_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2019.101652"},{"key":"e_1_2_11_2_2","doi-asserted-by":"publisher","DOI":"10.1145\/3314397"},{"key":"e_1_2_11_3_2","doi-asserted-by":"publisher","DOI":"10.1109\/comst.2017.2748278"},{"key":"e_1_2_11_4_2","doi-asserted-by":"publisher","DOI":"10.1109\/surv.2013.111413.00196"},{"key":"e_1_2_11_5_2","doi-asserted-by":"publisher","DOI":"10.3233\/JCS-2010-0403"},{"key":"e_1_2_11_6_2","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1983.1056650"},{"key":"e_1_2_11_7_2","first-page":"86","article-title":"Extending formal analysis of mobile device authentication","volume":"1","author":"Claycomb W. R.","year":"2011","journal-title":"Journal of Internet Services and Information Security"},{"key":"e_1_2_11_8_2","doi-asserted-by":"publisher","DOI":"10.1098\/rspa.1989.0125"},{"key":"e_1_2_11_9_2","unstructured":"BalfanzD. SmettersD. K. StewartP. andWongH. C. Talking to strangers: authentication in ad-hoc wireless networks Proceedings of Network and Distributed System Security Symposium 2002 (NDSS\u201902) February 2002 San Diego CA USA."},{"key":"e_1_2_11_10_2","doi-asserted-by":"crossref","unstructured":"MathurS. MillerR. VarshavskyA. TrappeW. andMandayamN. Proximate: proximity-based secure pairing using ambient wireless signals Proceedings of the 9th international conference on Mobile systems applications and services - MobiSys \u203211 2011 Bethesda Maryland USA 211\u2013224 https:\/\/doi.org\/10.1145\/1999995.2000016 2-s2.0-79961063540.","DOI":"10.1145\/1999995.2000016"},{"key":"e_1_2_11_11_2","doi-asserted-by":"publisher","DOI":"10.1504\/IJSN.2009.023422"},{"key":"e_1_2_11_12_2","doi-asserted-by":"crossref","unstructured":"XiW. QianC. HanJ. ZhaoK. ZhongS. LiX.-Y. andZhaoJ. Instant and robust authentication and key agreement among mobile devices Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security October 2016 Vienna Austria 616\u2013627 https:\/\/doi.org\/10.1145\/2976749.2978298 2-s2.0-84995529973.","DOI":"10.1145\/2976749.2978298"},{"key":"e_1_2_11_13_2","unstructured":"KarapanosN. MarforioC. SorienteC. andCapkunS. Sound-proof: usable two-factor authentication based on ambient sound 24th {USENIX} Security Symposium ({USENIX} Security 15) 2015 Washington D.C USA 483\u2013498."},{"key":"e_1_2_11_14_2","doi-asserted-by":"publisher","DOI":"10.1109\/tmc.2011.271"},{"key":"e_1_2_11_15_2","doi-asserted-by":"publisher","DOI":"10.1109\/tifs.2015.2505626"},{"key":"e_1_2_11_16_2","doi-asserted-by":"crossref","unstructured":"MiettinenM. AsokanN. NguyenT. D. SadeghiA.-R. andSobhaniM. Context-based zero-interaction pairing and key evolution for advanced personal devices Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security - CCS \u203214 2014 Scottsdale Arizona USA https:\/\/doi.org\/10.1145\/2660267.2660334 2-s2.0-84910661619.","DOI":"10.1145\/2660267.2660334"},{"key":"e_1_2_11_17_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-45472-5_23"},{"key":"e_1_2_11_18_2","doi-asserted-by":"crossref","unstructured":"TruongH. T. T. GaoX. ShresthaB. SaxenaN. AsokanN. andNurmiP. Comparing and fusing different sensor modalities for relay attack resistance in zero-interaction authentication 2014 IEEE International Conference on Pervasive Computing and Communications (PerCom) March 2014 Budapest Hungary https:\/\/doi.org\/10.1109\/percom.2014.6813957 2-s2.0-84901351388.","DOI":"10.1109\/PerCom.2014.6813957"},{"key":"e_1_2_11_19_2","doi-asserted-by":"crossref","unstructured":"HuC. ChengX. ZhangF. WuD. LiaoX. andChenD. OPFKA: secure and efficient ordered-physiological-feature-based key agreement for wireless body area networks 2013 Proceedings IEEE INFOCOM April 2013 Turin Italy 2274\u20132282 https:\/\/doi.org\/10.1109\/infcom.2013.6567031 2-s2.0-84879861042.","DOI":"10.1109\/INFCOM.2013.6567031"},{"key":"e_1_2_11_20_2","doi-asserted-by":"publisher","DOI":"10.1109\/tetc.2019.2949137"},{"key":"e_1_2_11_21_2","doi-asserted-by":"crossref","unstructured":"OberoiD. SouW. Y. LuiY. Y. FisherR. DincaL. andHanckeG. P. Wearable security: key derivation for body area sensor networks based on host movement 2016 IEEE 25th International Symposium on Industrial Electronics (ISIE) June 2016 Santa Clara CA USA 1116\u20131121 https:\/\/doi.org\/10.1109\/isie.2016.7745050 2-s2.0-85001075189.","DOI":"10.1109\/ISIE.2016.7745050"},{"key":"e_1_2_11_22_2","doi-asserted-by":"crossref","unstructured":"Sch\u00fcrmannD. Br\u00fcschA. SiggS. andWolfL. Bandana\u2014body area network device-to-device authentication using natural gait 2017 IEEE International Conference on Pervasive Computing and Communications (PerCom) 2017 Kona HI USA 190\u2013196 https:\/\/doi.org\/10.1109\/percom.2017.7917865 2-s2.0-85020046189.","DOI":"10.1109\/PERCOM.2017.7917865"},{"key":"e_1_2_11_23_2","doi-asserted-by":"publisher","DOI":"10.1007\/s10916-015-0272-9"},{"key":"e_1_2_11_24_2","doi-asserted-by":"crossref","unstructured":"LoweG. A hierarchy of authentication specifications Proceedings 10th Computer Security Foundations Workshop 1997 Rockport MA USA 31\u201343 https:\/\/doi.org\/10.1109\/csfw.1997.596782 2-s2.0-84994742813.","DOI":"10.1109\/CSFW.1997.596782"},{"key":"e_1_2_11_25_2","unstructured":"ChangR.andShmatikovV. Formal analysis of authentication in Bluetooth device pairing FCS-ARSPA07 2007."},{"key":"e_1_2_11_26_2","doi-asserted-by":"crossref","unstructured":"DelauneS. KremerS. andRobinL. Formal verification of protocols based on short authenticated strings 2017 IEEE 30th Computer Security Foundations Symposium (CSF) August 2017 Santa Barbara CA USA 130\u2013143 https:\/\/doi.org\/10.1109\/csf.2017.26 2-s2.0-85033800224.","DOI":"10.1109\/CSF.2017.26"},{"key":"e_1_2_11_27_2","doi-asserted-by":"crossref","unstructured":"SethiM. PeltonenA. andAuraT. Misbinding attacks on secure device pairing and bootstrapping Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security July 2019 Auckland New Zealand 453\u2013464 https:\/\/doi.org\/10.1145\/3321705.3329813 2-s2.0-85069962427.","DOI":"10.1145\/3321705.3329813"},{"key":"e_1_2_11_28_2","unstructured":"CranorL. F. A framework for reasoning about the human in the loop UPSEC\u203208: Proceedings of the 1st Conference on Usability Psychology and Security April 2008 Berkeley CA USA 1:1\u20131:15 https:\/\/doi.org\/10.5555\/1387649.1387650."},{"key":"e_1_2_11_29_2","doi-asserted-by":"crossref","unstructured":"KaindaR. FlechaisI. andRoscoeA. W. Usability and security of out-of-band channels in secure device pairing protocols Proceedings of the 5th Symposium on Usable Privacy and Security - SOUPS \u203209 2009 Mountain View California USA https:\/\/doi.org\/10.1145\/1572532.1572547 2-s2.0-70350716576.","DOI":"10.1145\/1572532.1572547"},{"key":"e_1_2_11_30_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.pmcj.2009.07.008"},{"key":"e_1_2_11_31_2","first-page":"29","article-title":"Manual authentication for wireless devices","volume":"7","author":"Gehrmann C.","year":"2004","journal-title":"RSA Cryptobytes"},{"key":"e_1_2_11_32_2","doi-asserted-by":"crossref","unstructured":"HanJ. LinY.-H. PerrigA. andBaiF. Short paper: MVSec: secure and easy-to-use pairing of mobile devices with vehicles Proceedings of the 2014 ACM conference on Security and privacy in wireless & mobile networks - WiSec \u203214 2014 Oxford United Kingdom 51\u201356 https:\/\/doi.org\/10.1145\/2627393.2627400 2-s2.0-84907384605.","DOI":"10.1145\/2627393.2627400"},{"key":"e_1_2_11_33_2","doi-asserted-by":"publisher","DOI":"10.1201\/b13092-21"},{"key":"e_1_2_11_34_2","doi-asserted-by":"publisher","DOI":"10.1007\/BF01782772"},{"key":"e_1_2_11_35_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-85886-7_27"},{"key":"e_1_2_11_36_2","unstructured":"SorienteC.andUzunE. BEDA: button-enabled device association."},{"key":"e_1_2_11_37_2","unstructured":"How NFC works nearfieldcommunication.org 2015 http:\/\/nearfieldcommunication.org\/how-it-works.html."},{"key":"e_1_2_11_38_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-16822-2_4"},{"key":"e_1_2_11_39_2","doi-asserted-by":"crossref","unstructured":"ZhouR.andXingG. nShield: a noninvasive NFC security system for mobiledevices Proceedings of the 12th annual international conference on Mobile systems applications and services - MobiSys \u203214 2014 95\u2013108 https:\/\/doi.org\/10.1145\/2594368.2594376 2-s2.0-84903125854.","DOI":"10.1145\/2594368.2594376"},{"key":"e_1_2_11_40_2","doi-asserted-by":"crossref","unstructured":"AkterS. ChakrabortyT. KhanT. A. ChellappanS. andAlI. Can you get into the middle of near field communication? 2017 IEEE 42nd Conference on Local Computer Networks (LCN) October 2017 Singapore Singapore 365\u2013373 https:\/\/doi.org\/10.1109\/LCN.2017.39 2-s2.0-85040585749.","DOI":"10.1109\/LCN.2017.39"},{"volume-title":"Wi-Fi Simple Configuration Technical Specification, version 2.0. 5","year":"2014","author":"Alliance W.-F.","key":"e_1_2_11_41_2"},{"volume-title":"Bluetooth Core Specification v5. 0","year":"2016","author":"Bluetooth S.","key":"e_1_2_11_42_2"},{"key":"e_1_2_11_43_2","first-page":"1","article-title":"RFID (radio frequency identification): principles and applications","volume":"2","author":"Weis S. A.","year":"2007","journal-title":"System"},{"key":"e_1_2_11_44_2","unstructured":"InstrumentN. Advanced RFID Measurements: Basic Theory to Protocol Conformance Test 2013."},{"key":"e_1_2_11_45_2","doi-asserted-by":"publisher","DOI":"10.1007\/11733447_21"},{"key":"e_1_2_11_46_2","doi-asserted-by":"publisher","DOI":"10.1002\/9780470889886"},{"volume-title":"IEEE Std 802.11 ad-2012, \u201cPart 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (phy) Specifications,\u201d Amendment 3: Enhancements for Very High Throughput in the 60 GHz Band, IEEE Standard for Information Technology\u2014Telecommunications and Information Exchange between Systems\u2014Local and Metropolitan Area Networks\u2014Specific Requirements","year":"2012","author":"IEEE Standards Association","key":"e_1_2_11_47_2"},{"volume-title":"WiGig\u00ae and the Future of Seamless Connectivity","year":"2013","author":"Alliance W.-F.","key":"e_1_2_11_48_2"},{"key":"e_1_2_11_49_2","doi-asserted-by":"publisher","DOI":"10.5772\/8636"},{"key":"e_1_2_11_50_2","doi-asserted-by":"crossref","unstructured":"SteinmetzerD. ChenJ. ClassenJ. KnightlyE. andHollickM. Eavesdropping with periscopes: experimental security analysis of highly directional millimeter waves 2015 IEEE Conference on Communications and Network Security (CNS) September 2015 Florence Italy 335\u2013343 https:\/\/doi.org\/10.1109\/cns.2015.7346844 2-s2.0-84966304385.","DOI":"10.1109\/CNS.2015.7346844"},{"key":"e_1_2_11_51_2","unstructured":"SiBEAM captures world\u2019s first 60 GHz millimeter-wave smartphone design win in leTV\u2019s flagship smartphone Le Max 2015."},{"key":"e_1_2_11_52_2","unstructured":"HP Elite x2 1011 G2 - connecting to the wireless dock 2019."},{"volume-title":"Visible Light Communications (VLC) Technology","year":"1999","author":"Ndjiongue A. R.","key":"e_1_2_11_53_2"},{"key":"e_1_2_11_54_2","doi-asserted-by":"crossref","unstructured":"PerliS. D. AhmedN. andKatabiD. Pixnet: interference-free wireless links using LCD-camera pairs Proceedings of the Sixteenth Annual International Conference on Mobile Computing and Networking - MobiCom \u203210 2010 Chicago Illinois USA 137\u2013148 https:\/\/doi.org\/10.1145\/1859995.1860012 2-s2.0-78649302859.","DOI":"10.1145\/1859995.1860012"},{"key":"e_1_2_11_55_2","doi-asserted-by":"crossref","unstructured":"ClassenJ. ChenJ. SteinmetzerD. HollickM. andKnightlyE. The spy next door: eavesdropping on high throughput visible light communications Proceedings of the 2nd International Workshop on Visible Light Communications Systems 2015 Paris France 9\u201314 https:\/\/doi.org\/10.1145\/2801073.2801075 2-s2.0-84982107149.","DOI":"10.1145\/2801073.2801075"},{"key":"e_1_2_11_56_2","doi-asserted-by":"crossref","unstructured":"DziechA. BialasJ. GlowaczA. KorusP. LeszczukM. MatiolalskiA. andBaranR. Overview of recent advances in CCTV processing chain in the INDECT and INSIGMA projects 2013 International Conference on Availability Reliability and Security September 2013 Regensburg Germany 836\u2013843 https:\/\/doi.org\/10.1109\/ares.2013.112 2-s2.0-84892421772.","DOI":"10.1109\/ARES.2013.112"},{"key":"e_1_2_11_57_2","doi-asserted-by":"crossref","unstructured":"RahmanM. TopkaraU. andCarbunarB. Seeing is not believing: visual verifications through liveness analysis using mobile devices Proceedings of the 29th Annual Computer Security Applications Conference on - ACSAC \u203213 2013 New Orleans Louisiana USA 239\u2013248 https:\/\/doi.org\/10.1145\/2523649.2523666 2-s2.0-84893304506.","DOI":"10.1145\/2523649.2523666"},{"key":"e_1_2_11_58_2","doi-asserted-by":"crossref","unstructured":"SaxenaN. EkbergJ.-E. KostiainenK. andAsokanN. Secure device pairing based on a visual channel 2006 IEEE Symposium on Security and Privacy (S&P\u203206) 2006 Berkeley\/Oakland CA USA https:\/\/doi.org\/10.1109\/sp.2006.35 2-s2.0-33751023773.","DOI":"10.1109\/SP.2006.35"},{"key":"e_1_2_11_59_2","doi-asserted-by":"crossref","unstructured":"RomanR.andLopezJ. KeyLED-transmitting sensitive data over out-of-band channels in wireless sensor networks 2008 5th IEEE International Conference on Mobile Ad Hoc and Sensor Systems) 2008 Atlanta GA USA 796\u2013801.","DOI":"10.1109\/MAHSS.2008.4660128"},{"key":"e_1_2_11_60_2","doi-asserted-by":"publisher","DOI":"10.1002\/sec.1400"},{"key":"e_1_2_11_61_2","doi-asserted-by":"publisher","DOI":"10.1109\/tmc.2015.2413791"},{"key":"e_1_2_11_62_2","doi-asserted-by":"publisher","DOI":"10.1007\/s11235-008-9075-3"},{"key":"e_1_2_11_63_2","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2013.2247758"},{"key":"e_1_2_11_64_2","doi-asserted-by":"publisher","DOI":"10.1109\/tmc.2018.2839604"},{"key":"e_1_2_11_65_2","doi-asserted-by":"crossref","unstructured":"GoodrichM. T. SirivianosM. SolisJ. TsudikG. andUzunE. Loud and clear: human-verifiable authentication based on audio 26th IEEE International Conference on Distributed Computing Systems (ICDCS\u203206) 2006 Lisboa Portugal https:\/\/doi.org\/10.1109\/icdcs.2006.52 2-s2.0-33947635594.","DOI":"10.1109\/ICDCS.2006.52"},{"key":"e_1_2_11_66_2","doi-asserted-by":"crossref","unstructured":"LeeK. RaghunathanV. RaghunathanA. andKimY. SyncVibe: fast and secure device pairing through physical vibration on commodity smartphones 2018 IEEE 36th International Conference on Computer Design (ICCD) October 2018 Orlando FL USA 234\u2013241 https:\/\/doi.org\/10.1109\/iccd.2018.00043 2-s2.0-85062241642.","DOI":"10.1109\/ICCD.2018.00043"},{"key":"e_1_2_11_67_2","first-page":"18","article-title":"Device pairing at the touch of an electrode","volume":"18","author":"Roeschlin M.","year":"2018","journal-title":"NDSS"},{"key":"e_1_2_11_68_2","unstructured":"RoyN. GowdaM. andChoudhuryR. R. Ripple: communicating through physical vibration 12th {USENIX} Symposium on Networked Systems Design and Implementation ({NSDI} 15) 2015 Oakland CA USA 265\u2013278."},{"key":"e_1_2_11_69_2","doi-asserted-by":"crossref","unstructured":"LiM. YuS. LouW. andRenK. Group device pairing based secure sensor association and key management for body area networks 2010 Proceedings IEEE INFOCOM March 2010 San Diego CA USA 1\u20139 https:\/\/doi.org\/10.1109\/infcom.2010.5462095 2-s2.0-77953304550.","DOI":"10.1109\/INFCOM.2010.5462095"},{"key":"e_1_2_11_70_2","unstructured":"RuaroA. ThaysenJ. andJakobsenyK. B. Head-centric body-channel propagation paths characterization 2015 9th European Conference on Antennas and Propagation (EuCAP) 2015 Berlin Heidelberg Germany 1\u20134."},{"key":"e_1_2_11_71_2","doi-asserted-by":"crossref","unstructured":"SaxenaN. UddinM. B. VorisJ. andAsokanN. Vibrate-to-unlock: mobile phone assisted user authentication to multiple personal RFID tags 2011 IEEE International Conference on Pervasive Computing and Communications (PerCom) March 2011 Seattle WA USA 181\u2013188 https:\/\/doi.org\/10.1109\/percom.2011.5767583 2-s2.0-79957950088.","DOI":"10.1109\/PERCOM.2011.5767583"},{"key":"e_1_2_11_72_2","doi-asserted-by":"publisher","DOI":"10.1109\/tit.1976.1055638"},{"key":"e_1_2_11_73_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2018.12.002"},{"key":"e_1_2_11_74_2","doi-asserted-by":"crossref","unstructured":"GallaisA. HedliT.-H. LoscriV. andMittonN. Denial-of-sleep attacks against IoT networks 2019 6th International Conference on Control Decision and Information Technologies (CoDIT) April 2019 Paris France 1025\u20131030 https:\/\/doi.org\/10.1109\/codit.2019.8820402 2-s2.0-85072844283.","DOI":"10.1109\/CoDIT.2019.8820402"},{"key":"e_1_2_11_75_2","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2017.201"},{"key":"e_1_2_11_76_2","doi-asserted-by":"crossref","unstructured":"F\u00e1bregaF. J. T. HerzogJ. C. andGuttmanJ. D. Strand spaces: why is a security protocol correct? Proceedings. 1998 IEEE Symposium on Security and Privacy (Cat. No.98CB36186) 1998 Oakland CA USA 160\u2013171 https:\/\/doi.org\/10.1109\/secpri.1998.674832.","DOI":"10.1109\/SECPRI.1998.674832"},{"key":"e_1_2_11_77_2","doi-asserted-by":"publisher","DOI":"10.1145\/2926715"},{"key":"e_1_2_11_78_2","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-48329-2_21"},{"key":"e_1_2_11_79_2","doi-asserted-by":"crossref","unstructured":"BellareM.andRogawayP. Provably secure session key distribution: the three party case STOC \u203295: Proceedings of the Twenty-Seventh Annual ACM Symposium on Theory of Computing May 1995 Las Vegas NV USA 57\u201366 https:\/\/doi.org\/10.1145\/225058.225084.","DOI":"10.1145\/225058.225084"},{"key":"e_1_2_11_80_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2010.04.008"},{"key":"e_1_2_11_81_2","doi-asserted-by":"crossref","unstructured":"DofeJ. FreyJ. andYuQ. Hardware security assurance in emerging IoT applications 2016 IEEE International Symposium on Circuits and Systems (ISCAS) May 2016 Montreal QC Canada 2050\u20132053 https:\/\/doi.org\/10.1109\/iscas.2016.7538981 2-s2.0-84983429277.","DOI":"10.1109\/ISCAS.2016.7538981"},{"key":"e_1_2_11_82_2","article-title":"Analysis of covert hardware attacks","volume":"5","author":"Moein S.","year":"2014","journal-title":"Journal of Convergence"},{"key":"e_1_2_11_83_2","doi-asserted-by":"publisher","DOI":"10.1109\/tmc.2009.88"},{"key":"e_1_2_11_84_2","article-title":"A comprehensive IoT attacks survey based on a building-blocked reference model","volume":"9","author":"Abdul-Ghani H. A.","year":"2018","journal-title":"International Journal of Advanced Computer Science and Applications"},{"key":"e_1_2_11_85_2","doi-asserted-by":"crossref","unstructured":"AhemdM. M. ShahM. A. andWahidA. IoT security: a layered approach for attacks defenses 2017 International Conference on Communication Technologies (ComTech) April 2017 Rawalpindi Pakistan 104\u2013110 https:\/\/doi.org\/10.1109\/COMTECH.2017.8065757 2-s2.0-85034740090.","DOI":"10.1109\/COMTECH.2017.8065757"},{"key":"e_1_2_11_86_2","unstructured":"DeogirikarJ.andVidhateA. Security Attacks in IoT: A Survey 32\u201337."},{"key":"e_1_2_11_87_2","unstructured":"BlanchetB. SmythB. ChevalV. andSylvestreM. ProVerif 2.00: Automatic Cryptographic Protocol Verifier User Manual and Tutorial 2018 05\u201316."},{"key":"e_1_2_11_88_2","doi-asserted-by":"publisher","DOI":"10.1007\/11935070_6"},{"key":"e_1_2_11_89_2","doi-asserted-by":"publisher","DOI":"10.1007\/11535218_19"},{"key":"e_1_2_11_90_2","doi-asserted-by":"publisher","DOI":"10.1007\/11745853_26"},{"key":"e_1_2_11_91_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-27809-2_22"},{"key":"e_1_2_11_92_2","doi-asserted-by":"publisher","DOI":"10.1109\/MPRV.2007.76"},{"key":"e_1_2_11_93_2","doi-asserted-by":"crossref","unstructured":"NguyenT.andLeneutreJ. Formal analysis of secure device pairing protocols 2014 IEEE 13th International Symposium on Network Computing and Applications August 2014 Cambridge MA USA 291\u2013295 https:\/\/doi.org\/10.1109\/nca.2014.50 2-s2.0-84911012962.","DOI":"10.1109\/NCA.2014.50"},{"key":"e_1_2_11_94_2","doi-asserted-by":"crossref","unstructured":"NguyenT.andLeneutreJ. A secure and effective device pairing protocol 2015 12th Annual IEEE Consumer Communications and Networking Conference (CCNC) 2015 Las Vegas NV USA 507\u2013512 https:\/\/doi.org\/10.1109\/ccnc.2015.7158026 2-s2.0-84943150577.","DOI":"10.1109\/CCNC.2015.7158026"},{"key":"e_1_2_11_95_2","doi-asserted-by":"publisher","DOI":"10.1007\/BF00124891"},{"first-page":"154","volume-title":"Public Key Cryptography. PKC 1999. Lecture Notes in Computer Science, vol 1560","author":"Blake-Wilson S.","key":"e_1_2_11_96_2"},{"key":"e_1_2_11_97_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2020.102461"},{"key":"e_1_2_11_98_2","unstructured":"AuraT.andSethiM. Nimble Out-of-Band Authentication for EAP (EAP-NOOB). draft-aura-eap-noob-03 (Work in Progress) 2018."},{"key":"e_1_2_11_99_2","doi-asserted-by":"crossref","unstructured":"AbobaB. BlunkL. VollbrechtJ. CarlsonJ. andLevkowetzH. et al Extensible authentication protocol (EAP) 2004.","DOI":"10.17487\/rfc3748"},{"key":"e_1_2_11_100_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-77366-5_30"},{"key":"e_1_2_11_101_2","doi-asserted-by":"publisher","DOI":"10.1007\/s00779-017-1081-6"},{"key":"e_1_2_11_102_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-77086-2_13"},{"key":"e_1_2_11_103_2","article-title":"CryptoVerif: computationally sound mechanized prover for cryptographic protocols","volume":"117","author":"Blanchet B.","year":"2007","journal-title":"Dagstuhl Seminar Formal Protocol Verification Applied"},{"key":"e_1_2_11_104_2","doi-asserted-by":"publisher","DOI":"10.1109\/tifs.2017.2766048"}],"container-title":["Wireless Communications and Mobile Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/downloads.hindawi.com\/journals\/wcmc\/2021\/8887472.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/wcmc\/2021\/8887472.xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1155\/2021\/8887472","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,8,7]],"date-time":"2024-08-07T09:23:48Z","timestamp":1723022628000},"score":1,"resource":{"primary":{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/10.1155\/2021\/8887472"}},"subtitle":[],"editor":[{"given":"Qi","family":"Jiang","sequence":"additional","affiliation":[]}],"short-title":[],"issued":{"date-parts":[[2021,1]]},"references-count":104,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2021,1]]}},"alternative-id":["10.1155\/2021\/8887472"],"URL":"https:\/\/doi.org\/10.1155\/2021\/8887472","archive":["Portico"],"relation":{},"ISSN":["1530-8669","1530-8677"],"issn-type":[{"type":"print","value":"1530-8669"},{"type":"electronic","value":"1530-8677"}],"subject":[],"published":{"date-parts":[[2021,1]]},"assertion":[{"value":"2020-08-05","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2020-11-24","order":2,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2021-01-30","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}],"article-number":"8887472"}}