Authenticated Communication in Crises: Toward an Infrastructureless Trust Model for Challenged Networks

被引:0
作者
Tehrani, Pouyan Fotouhi [1 ]
Osterweil, Eric [2 ]
Schiller, Jochen H. [3 ]
Schmidt, Thomas C. [4 ]
Waehlisch, Matthias [3 ]
机构
[1] Fraunhofer Fokus, Weizenbaum Inst, Berlin, Germany
[2] George Mason Univ, Fairfax, VA 22030 USA
[3] Free Univ Berlin, Berlin, Germany
[4] HAW Hamburg, Hamburg, Germany
来源
2019 INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGIES FOR DISASTER MANAGEMENT (ICT-DM 2019) | 2019年
关键词
Information-centric Networking; Disaster Management; Data-origin Authentication; Trust;
D O I
10.1109/ict-dm47966.2019.9032958
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Natural as well as human-caused disasters and catastrophes easily lead to chaos. Effective crisis communication and informing the public about the ongoing situation can reduce chaos and maintain social resiliency. Communication, however, relies on a working physical infrastructure, which usually is broken in the incident area. Whereas first response teams and authorities benefit from special communication equipment, civilians do not and experience longer periods of being disconnected from the outside world. Even if messages come through occasionally, the communication is too intermittent to allow for channel-based trust models. TLS, for example, requires access to trusted third parties to authenticate data. In this position paper, we argue that end-to-end communication conflicts with disaster scenarios. We propose an approach that leverages information-centric networking (ICN) to authenticate risk and crisis communication in loosely connected communication systems. Our proposal makes use of spatiotemporal de coupling of data from their producers based on ICN for optimal message propagation in fragmented networks, while introducing a trust bootstrapping phase to enable off-line authentication. The data-oriented security model of ICN is used to tailor a trust model specifically for scenarios during which access to trusted third parties or data owners is not given and messages are relayed through untrusted parties.
引用
收藏
页数:4
相关论文
共 20 条
  • [1] [Anonymous], 2019, RES DIRECTIONS USING
  • [2] [Anonymous], 2013, THESIS
  • [3] Decentralized trust management
    Blaze, M
    Feigenbaum, J
    Lacy, J
    [J]. 1996 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 1996, : 164 - 173
  • [4] Cooper D., 2008, RFC 5280
  • [5] Communication Management and Trust: Their Role in Building Resilience to "Surprises" Such As Natural Disasters, Pandemic Flu, and Terrorism
    Longstaff, P. H.
    Yang, Sung-Un
    [J]. ECOLOGY AND SOCIETY, 2008, 13 (01):
  • [6] O'Reilly G., 2006, Int. Telecommunications Network Strategy and Planning Symposium (Networks), P1
  • [7] Crisis and emergency risk communication as an integrative model
    Reynolds, B
    Seeger, MW
    [J]. JOURNAL OF HEALTH COMMUNICATION, 2005, 10 (01) : 43 - 55
  • [8] Connecting the Edges: A Universal, Mobile-Centric, and Opportunistic Communications Architecture
    Sarros, Christos-Alexandros
    Diamantopoulos, Sotiris
    Rene, Sergi
    Psaras, Ioannis
    Lertsinsrubtavee, Adisorn
    Molina-Jimenez, Carlos
    Mendes, Paulo
    Sofia, Rute
    Sathiaseelan, Arjuna
    Pavlou, George
    Crowcroft, Jon
    Tsaoussidis, Vassilis
    [J]. IEEE COMMUNICATIONS MAGAZINE, 2018, 56 (02) : 136 - 143
  • [9] Seedorf J, 2015, IEEE GLOBE WORK
  • [10] Seedorf J, 2014, IEEE CONF COMPUT, P416, DOI 10.1109/INFCOMW.2014.6849268