An autonomous attestation token to secure mobile agents in disaster response

被引:1
作者
Hein, Daniel M. [1 ]
Toegl, Ronald [1 ]
Kraxberger, Stefan [1 ]
机构
[1] Graz Univ Technol, Inst Appl Informat Proc & Commun IAIK, A-8010 Graz, Austria
关键词
disaster response; mobile agents; trusted computing; attestation; ad hoc networks; peer-to-peer;
D O I
10.1002/sec.196
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Modern communication and computing devices have the potential to increase the efficiency of disaster response. Mobile agents and ad hoc networks are decentralized and flexible technologies to leverage this potential. While both ad hoc networks and mobile agent platforms suffer from a greater variety of security risks than the classic client-server approach, Trusted Computing is capable of alleviating these problems. Unfortunately, Remote Attestation, a core concept of Trusted Computing, requires a powerful networked entity to perform trust decisions. The existence and availability of such a service in a disaster response scenario cannot be relied upon. In this paper we introduce the autonomous attestation token (AAT), a hardware token for mobile computing devices that is capable of guaranteeing the trusted state of a limited set of devices without relying on a networked service. We propose a Local Attestation protocol with user interaction that in conjunction with the AAT prevents unauthorized access to an emergency mobile agent platform. In addition, we sketch a possible solution which integrates trusted computing to leverage ad hoc networks and peer-to-peer systems to provide a robust communication platform. This helps ensuring the security of the next generation of disaster response tools. Copyright (C) 2010 John Wiley & Sons, Ltd.
引用
收藏
页码:421 / 438
页数:18
相关论文
共 55 条
[1]   Cryptographic processors - A surrey [J].
Anderson, R ;
Bond, M ;
Clulow, J ;
Skorobogatov, S .
PROCEEDINGS OF THE IEEE, 2006, 94 (02) :357-369
[2]   Anthill:: A framework for the development of agent-based peer-to-peer systems [J].
Babaoglu, Ö ;
Meling, H ;
Montresor, A .
22ND INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS, PROCEEDINGS, 2002, :15-22
[3]  
Balfe S, 2007, 21ST INTERNATIONAL CONFERENCE ON ADVANCED NETWORKING AND APPLICATIONS WORKSHOPS/SYMPOSIA, VOL 2, PROCEEDINGS, P486
[4]   On the distribution and revocation of cryptographic keys in sensor networks [J].
Chan, HW ;
Gligor, VD ;
Perrig, A ;
Muralidharan, G .
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2005, 2 (03) :233-247
[5]  
CHEN RY, 2003, HAW INT C SYST SCI, V9, pA282, DOI DOI 10.1109/HICSS.2003.1174815
[6]  
Clausen T., 2003, Optimized link state routing protocol (OLSR)
[7]  
Coker G, 2008, LECT NOTES COMPUT SC, V5308, P1, DOI 10.1007/978-3-540-88625-9_1
[8]  
CORSON S., 1999, 2501 RFC
[9]  
*EMSCB CONS, EUR MIL SEC COMP BAS
[10]   A trusted open platform [J].
England, P ;
Lampson, B ;
Manferdelli, J ;
Peinado, M ;
Willman, B .
COMPUTER, 2003, 36 (07) :55-+