EconPapers    
Economics at your fingertips  
 

Efficient and Secure Pairing Protocol for Devices with Unbalanced Computational Capabilities

Xin Huang, Haotian Yin, Xin Zhang, Di Zhang, Sheng Chai, Bin Xing, Jie Zhang, Xiaoling Yu, Yu Zhou and Haixia Zheng
Additional contact information
Xin Huang: College of Data Science, Taiyuan University of Technology, Taiyuan 030024, China
Haotian Yin: College of Data Science, Taiyuan University of Technology, Taiyuan 030024, China
Xin Zhang: College of Data Science, Taiyuan University of Technology, Taiyuan 030024, China
Di Zhang: College of Data Science, Taiyuan University of Technology, Taiyuan 030024, China
Sheng Chai: College of Data Science, Taiyuan University of Technology, Taiyuan 030024, China
Bin Xing: College of Data Science, Taiyuan University of Technology, Taiyuan 030024, China
Jie Zhang: Department of Computer Science and Software Engineering, Xi’an Jiaotong-Liverpool University, Suzhou 215123, China
Xiaoling Yu: College of Data Science, Taiyuan University of Technology, Taiyuan 030024, China
Yu Zhou: College of Data Science, Taiyuan University of Technology, Taiyuan 030024, China
Haixia Zheng: College of Data Science, Taiyuan University of Technology, Taiyuan 030024, China

Mathematics, 2022, vol. 10, issue 14, 1-23

Abstract: Wearable devices that collect data about human beings are widely used in healthcare applications. Once collected, the health data will be securely transmitted to smartphones in most scenarios. Authenticated Key Exchange (AKE) can protect wireless communications between wearables and smartphones, and a typical solution is the Bluetooth Secure Simple Pairing (SSP) protocol with numeric comparison. However, this protocol requires equivalent computation on both devices, even though their computational capabilities are significantly different. This paper proposes a lightweight numeric comparison protocol for communications in which two parties have unbalanced computational capabilities, e.g., a wearable sensor and a smartphone, named UnBalanced secure Pairing using numeric comparison (UB-Pairing for short). The security of UB-Pairing is analyzed using the modified Bellare–Rogaway model (mBR). The analysis results show that UB-Pairing achieves the security goals. We also carry out a number of experiments to evaluate the performance of UB-Pairing. The results show that UB-Pairing is friendly to wearable devices, and more efficient than standard protocols when the computation capabilities of the two communication parties are highly unbalanced.

Keywords: device pairing; Secure Simple Pairing; Bluetooth 5.00; OOB channel; COVID-19 (search for similar items in EconPapers)
JEL-codes: C (search for similar items in EconPapers)
Date: 2022
References: View complete reference list from CitEc
Citations:

Downloads: (external link)
https://www.mdpi.com/2227-7390/10/14/2447/pdf (application/pdf)
https://www.mdpi.com/2227-7390/10/14/2447/ (text/html)

Related works:
This item may be available elsewhere in EconPapers: Search for items with the same title.

Export reference: BibTeX RIS (EndNote, ProCite, RefMan) HTML/Text

Persistent link: https://EconPapers.repec.org/RePEc:gam:jmathe:v:10:y:2022:i:14:p:2447-:d:862016

Access Statistics for this article

Mathematics is currently edited by Ms. Emma He

More articles in Mathematics from MDPI
Bibliographic data for series maintained by MDPI Indexing Manager ().

 
Page updated 2025-03-19
Handle: RePEc:gam:jmathe:v:10:y:2022:i:14:p:2447-:d:862016