Integrating trust establishment into routing protocols of today's MANETs
Conventional network protocols and its security mechanisms fail to cope with arising challenges in trust. Well known concepts from the domain of Trusted Computing can be applied to the example of mobile ad-hoc networks (MANETs) in order to establish extended trust capabilities between devices. The a...
Gespeichert in:
Hauptverfasser: | , , , , , , |
---|---|
Format: | Tagungsbericht |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 2374 |
---|---|
container_issue | |
container_start_page | 2369 |
container_title | |
container_volume | |
creator | Oberle, Alexander Rein, Andre Kuntze, Nicolai Rudolph, Carsten Paatero, Janne Lunn, Andrew Racz, Peter |
description | Conventional network protocols and its security mechanisms fail to cope with arising challenges in trust. Well known concepts from the domain of Trusted Computing can be applied to the example of mobile ad-hoc networks (MANETs) in order to establish extended trust capabilities between devices. The approach of such an anchor of trust in MANETs shows interesting possibilities since no central instances such as Access Points are involved in those networks. The communication between directly connected devices of the network is protected by a cryptographic protocol making use of a Trusted Platform Module (TPM) that serves as root-of-trust on each device. Such a hardware chip allows devices to attest the local system state and assess states of remote systems. Building on this, transmission of routing and payload data can be restricted to devices in trustworthy states. The resulting mobile ad-hoc network, by using this protocol, is protected against many of today's security threats. Single malicious devices are automatically recognised and excluded from participation in the network by all devices. Especially the dissemination of misleading routing information, which affects the availability of the whole network, is effectively prevented by the developed protocol. Thus, it is shown that the device itself is secured by a hardware TPM. Also the communication is secured, by verifying the device's state between the counterparts. |
doi_str_mv | 10.1109/WCNC.2013.6554931 |
format | Conference Proceeding |
fullrecord | <record><control><sourceid>ieee_6IE</sourceid><recordid>TN_cdi_ieee_primary_6554931</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>6554931</ieee_id><sourcerecordid>6554931</sourcerecordid><originalsourceid>FETCH-LOGICAL-i175t-96cdf0fac0aba55b0e73a58fa0e97bdeeef13344274c35da0fec42a8bf9a1ce13</originalsourceid><addsrcrecordid>eNo1kL1OwzAYRc2fRCl5AMTijSnBn3_ieKyiQiuVshQxVl8SuwSlcRW7Q9--Bcp0h3N0hkvIA7AMgJnnz3JZZpyByHKlpBFwQe5A5looI3RxSUagVJHyHPgVSYwu_lnBr38YV6lQALckCeGbMXZqagZyRGbzPtrNgLHtNzQO-xCpDRGrrg1fW9tH2vbR08Hvf4Xd4KOvfReodzT6Bg9Pgb5NltNVuCc3Drtgk_OOycfLdFXO0sX767ycLNIWtIqpyevGMYc1wwqVqpjVAlXhkFmjq8Za60AIKbmWtVANMmdrybGonEGoLYgxefzrtid3vRvaLQ6H9fkUcQSqbFLw</addsrcrecordid><sourcetype>Publisher</sourcetype><iscdi>true</iscdi><recordtype>conference_proceeding</recordtype></control><display><type>conference_proceeding</type><title>Integrating trust establishment into routing protocols of today's MANETs</title><source>IEEE Electronic Library (IEL) Conference Proceedings</source><creator>Oberle, Alexander ; Rein, Andre ; Kuntze, Nicolai ; Rudolph, Carsten ; Paatero, Janne ; Lunn, Andrew ; Racz, Peter</creator><creatorcontrib>Oberle, Alexander ; Rein, Andre ; Kuntze, Nicolai ; Rudolph, Carsten ; Paatero, Janne ; Lunn, Andrew ; Racz, Peter</creatorcontrib><description>Conventional network protocols and its security mechanisms fail to cope with arising challenges in trust. Well known concepts from the domain of Trusted Computing can be applied to the example of mobile ad-hoc networks (MANETs) in order to establish extended trust capabilities between devices. The approach of such an anchor of trust in MANETs shows interesting possibilities since no central instances such as Access Points are involved in those networks. The communication between directly connected devices of the network is protected by a cryptographic protocol making use of a Trusted Platform Module (TPM) that serves as root-of-trust on each device. Such a hardware chip allows devices to attest the local system state and assess states of remote systems. Building on this, transmission of routing and payload data can be restricted to devices in trustworthy states. The resulting mobile ad-hoc network, by using this protocol, is protected against many of today's security threats. Single malicious devices are automatically recognised and excluded from participation in the network by all devices. Especially the dissemination of misleading routing information, which affects the availability of the whole network, is effectively prevented by the developed protocol. Thus, it is shown that the device itself is secured by a hardware TPM. Also the communication is secured, by verifying the device's state between the counterparts.</description><identifier>ISSN: 1525-3511</identifier><identifier>ISBN: 9781467359382</identifier><identifier>ISBN: 1467359386</identifier><identifier>EISSN: 1558-2612</identifier><identifier>EISBN: 1467359378</identifier><identifier>EISBN: 1467359394</identifier><identifier>EISBN: 9781467359399</identifier><identifier>EISBN: 9781467359375</identifier><identifier>DOI: 10.1109/WCNC.2013.6554931</identifier><language>eng</language><publisher>IEEE</publisher><subject>Ad hoc networks ; Authentication ; Cryptography ; Mobile computing ; Protocols ; Routing</subject><ispartof>2013 IEEE Wireless Communications and Networking Conference (WCNC), 2013, p.2369-2374</ispartof><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/6554931$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>309,310,780,784,789,790,2058,27925,54920</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/6554931$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Oberle, Alexander</creatorcontrib><creatorcontrib>Rein, Andre</creatorcontrib><creatorcontrib>Kuntze, Nicolai</creatorcontrib><creatorcontrib>Rudolph, Carsten</creatorcontrib><creatorcontrib>Paatero, Janne</creatorcontrib><creatorcontrib>Lunn, Andrew</creatorcontrib><creatorcontrib>Racz, Peter</creatorcontrib><title>Integrating trust establishment into routing protocols of today's MANETs</title><title>2013 IEEE Wireless Communications and Networking Conference (WCNC)</title><addtitle>WCNC</addtitle><description>Conventional network protocols and its security mechanisms fail to cope with arising challenges in trust. Well known concepts from the domain of Trusted Computing can be applied to the example of mobile ad-hoc networks (MANETs) in order to establish extended trust capabilities between devices. The approach of such an anchor of trust in MANETs shows interesting possibilities since no central instances such as Access Points are involved in those networks. The communication between directly connected devices of the network is protected by a cryptographic protocol making use of a Trusted Platform Module (TPM) that serves as root-of-trust on each device. Such a hardware chip allows devices to attest the local system state and assess states of remote systems. Building on this, transmission of routing and payload data can be restricted to devices in trustworthy states. The resulting mobile ad-hoc network, by using this protocol, is protected against many of today's security threats. Single malicious devices are automatically recognised and excluded from participation in the network by all devices. Especially the dissemination of misleading routing information, which affects the availability of the whole network, is effectively prevented by the developed protocol. Thus, it is shown that the device itself is secured by a hardware TPM. Also the communication is secured, by verifying the device's state between the counterparts.</description><subject>Ad hoc networks</subject><subject>Authentication</subject><subject>Cryptography</subject><subject>Mobile computing</subject><subject>Protocols</subject><subject>Routing</subject><issn>1525-3511</issn><issn>1558-2612</issn><isbn>9781467359382</isbn><isbn>1467359386</isbn><isbn>1467359378</isbn><isbn>1467359394</isbn><isbn>9781467359399</isbn><isbn>9781467359375</isbn><fulltext>true</fulltext><rsrctype>conference_proceeding</rsrctype><creationdate>2013</creationdate><recordtype>conference_proceeding</recordtype><sourceid>6IE</sourceid><sourceid>RIE</sourceid><recordid>eNo1kL1OwzAYRc2fRCl5AMTijSnBn3_ieKyiQiuVshQxVl8SuwSlcRW7Q9--Bcp0h3N0hkvIA7AMgJnnz3JZZpyByHKlpBFwQe5A5looI3RxSUagVJHyHPgVSYwu_lnBr38YV6lQALckCeGbMXZqagZyRGbzPtrNgLHtNzQO-xCpDRGrrg1fW9tH2vbR08Hvf4Xd4KOvfReodzT6Bg9Pgb5NltNVuCc3Drtgk_OOycfLdFXO0sX767ycLNIWtIqpyevGMYc1wwqVqpjVAlXhkFmjq8Za60AIKbmWtVANMmdrybGonEGoLYgxefzrtid3vRvaLQ6H9fkUcQSqbFLw</recordid><startdate>201304</startdate><enddate>201304</enddate><creator>Oberle, Alexander</creator><creator>Rein, Andre</creator><creator>Kuntze, Nicolai</creator><creator>Rudolph, Carsten</creator><creator>Paatero, Janne</creator><creator>Lunn, Andrew</creator><creator>Racz, Peter</creator><general>IEEE</general><scope>6IE</scope><scope>6IL</scope><scope>CBEJK</scope><scope>RIE</scope><scope>RIL</scope></search><sort><creationdate>201304</creationdate><title>Integrating trust establishment into routing protocols of today's MANETs</title><author>Oberle, Alexander ; Rein, Andre ; Kuntze, Nicolai ; Rudolph, Carsten ; Paatero, Janne ; Lunn, Andrew ; Racz, Peter</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-i175t-96cdf0fac0aba55b0e73a58fa0e97bdeeef13344274c35da0fec42a8bf9a1ce13</frbrgroupid><rsrctype>conference_proceedings</rsrctype><prefilter>conference_proceedings</prefilter><language>eng</language><creationdate>2013</creationdate><topic>Ad hoc networks</topic><topic>Authentication</topic><topic>Cryptography</topic><topic>Mobile computing</topic><topic>Protocols</topic><topic>Routing</topic><toplevel>online_resources</toplevel><creatorcontrib>Oberle, Alexander</creatorcontrib><creatorcontrib>Rein, Andre</creatorcontrib><creatorcontrib>Kuntze, Nicolai</creatorcontrib><creatorcontrib>Rudolph, Carsten</creatorcontrib><creatorcontrib>Paatero, Janne</creatorcontrib><creatorcontrib>Lunn, Andrew</creatorcontrib><creatorcontrib>Racz, Peter</creatorcontrib><collection>IEEE Electronic Library (IEL) Conference Proceedings</collection><collection>IEEE Proceedings Order Plan All Online (POP All Online) 1998-present by volume</collection><collection>IEEE Xplore All Conference Proceedings</collection><collection>IEEE Electronic Library (IEL)</collection><collection>IEEE Proceedings Order Plans (POP All) 1998-Present</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Oberle, Alexander</au><au>Rein, Andre</au><au>Kuntze, Nicolai</au><au>Rudolph, Carsten</au><au>Paatero, Janne</au><au>Lunn, Andrew</au><au>Racz, Peter</au><format>book</format><genre>proceeding</genre><ristype>CONF</ristype><atitle>Integrating trust establishment into routing protocols of today's MANETs</atitle><btitle>2013 IEEE Wireless Communications and Networking Conference (WCNC)</btitle><stitle>WCNC</stitle><date>2013-04</date><risdate>2013</risdate><spage>2369</spage><epage>2374</epage><pages>2369-2374</pages><issn>1525-3511</issn><eissn>1558-2612</eissn><isbn>9781467359382</isbn><isbn>1467359386</isbn><eisbn>1467359378</eisbn><eisbn>1467359394</eisbn><eisbn>9781467359399</eisbn><eisbn>9781467359375</eisbn><abstract>Conventional network protocols and its security mechanisms fail to cope with arising challenges in trust. Well known concepts from the domain of Trusted Computing can be applied to the example of mobile ad-hoc networks (MANETs) in order to establish extended trust capabilities between devices. The approach of such an anchor of trust in MANETs shows interesting possibilities since no central instances such as Access Points are involved in those networks. The communication between directly connected devices of the network is protected by a cryptographic protocol making use of a Trusted Platform Module (TPM) that serves as root-of-trust on each device. Such a hardware chip allows devices to attest the local system state and assess states of remote systems. Building on this, transmission of routing and payload data can be restricted to devices in trustworthy states. The resulting mobile ad-hoc network, by using this protocol, is protected against many of today's security threats. Single malicious devices are automatically recognised and excluded from participation in the network by all devices. Especially the dissemination of misleading routing information, which affects the availability of the whole network, is effectively prevented by the developed protocol. Thus, it is shown that the device itself is secured by a hardware TPM. Also the communication is secured, by verifying the device's state between the counterparts.</abstract><pub>IEEE</pub><doi>10.1109/WCNC.2013.6554931</doi><tpages>6</tpages></addata></record> |
fulltext | fulltext_linktorsrc |
identifier | ISSN: 1525-3511 |
ispartof | 2013 IEEE Wireless Communications and Networking Conference (WCNC), 2013, p.2369-2374 |
issn | 1525-3511 1558-2612 |
language | eng |
recordid | cdi_ieee_primary_6554931 |
source | IEEE Electronic Library (IEL) Conference Proceedings |
subjects | Ad hoc networks Authentication Cryptography Mobile computing Protocols Routing |
title | Integrating trust establishment into routing protocols of today's MANETs |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-28T17%3A12%3A19IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-ieee_6IE&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=proceeding&rft.atitle=Integrating%20trust%20establishment%20into%20routing%20protocols%20of%20today's%20MANETs&rft.btitle=2013%20IEEE%20Wireless%20Communications%20and%20Networking%20Conference%20(WCNC)&rft.au=Oberle,%20Alexander&rft.date=2013-04&rft.spage=2369&rft.epage=2374&rft.pages=2369-2374&rft.issn=1525-3511&rft.eissn=1558-2612&rft.isbn=9781467359382&rft.isbn_list=1467359386&rft_id=info:doi/10.1109/WCNC.2013.6554931&rft_dat=%3Cieee_6IE%3E6554931%3C/ieee_6IE%3E%3Curl%3E%3C/url%3E&rft.eisbn=1467359378&rft.eisbn_list=1467359394&rft.eisbn_list=9781467359399&rft.eisbn_list=9781467359375&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rft_ieee_id=6554931&rfr_iscdi=true |