An autonomous attestation token to secure mobile agents in disaster response

被引:1
作者
Hein, Daniel M. [1 ]
Toegl, Ronald [1 ]
Kraxberger, Stefan [1 ]
机构
[1] Graz Univ Technol, Inst Appl Informat Proc & Commun IAIK, A-8010 Graz, Austria
关键词
disaster response; mobile agents; trusted computing; attestation; ad hoc networks; peer-to-peer;
D O I
10.1002/sec.196
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Modern communication and computing devices have the potential to increase the efficiency of disaster response. Mobile agents and ad hoc networks are decentralized and flexible technologies to leverage this potential. While both ad hoc networks and mobile agent platforms suffer from a greater variety of security risks than the classic client-server approach, Trusted Computing is capable of alleviating these problems. Unfortunately, Remote Attestation, a core concept of Trusted Computing, requires a powerful networked entity to perform trust decisions. The existence and availability of such a service in a disaster response scenario cannot be relied upon. In this paper we introduce the autonomous attestation token (AAT), a hardware token for mobile computing devices that is capable of guaranteeing the trusted state of a limited set of devices without relying on a networked service. We propose a Local Attestation protocol with user interaction that in conjunction with the AAT prevents unauthorized access to an emergency mobile agent platform. In addition, we sketch a possible solution which integrates trusted computing to leverage ad hoc networks and peer-to-peer systems to provide a robust communication platform. This helps ensuring the security of the next generation of disaster response tools. Copyright (C) 2010 John Wiley & Sons, Ltd.
引用
收藏
页码:421 / 438
页数:18
相关论文
共 55 条
[21]  
Kauer B., 2007, SS 07 P 16 USENIX SE, P1
[22]  
KRAXBERGER S, 2008, MOB 08 P 5 ANN INT C, P1, DOI DOI 10.4108/ICST.MOBIQUITOUS2008.3892
[23]  
KRAXBERGER S, 2009, SECURE PEER TO PEER
[24]  
Kraxberger S., 2009, IWCMC 09, P931, DOI DOI 10.1145/1582379.1582582
[25]  
KURSAWE K, 2005, CRASH CRYPTOGRAPHIC
[26]  
LI J, 2005, 2005 2 INT C MOB TEC, DOI DOI 10.1I09/MTAS.2005.243756
[27]  
Lowe G., 1996, Tools and Algorithms for the Construction and Analysis of Systems. Second International Workshop, TACAS '96. Proceedings, P147
[28]   Software implementation for mobile agents in peer-to-peer-networks -: A case study [J].
Lübke, D ;
Gómez, JM .
15TH INTERNATIONAL WORKSHOP ON DATABASE AND EXPERT SYSTEMS APPLICATIONS, PROCEEDINGS, 2004, :959-963
[29]  
MACKER J, 2005, IEEE MIL COMM C 2005, V2, P883, DOI DOI 10.1109/MILCOM.2005.1605792
[30]  
MARCHESINI J, 2003, EXPT TCPA TCG HARDWA