Integrating trust establishment into routing protocols of today's MANETs

Conventional network protocols and its security mechanisms fail to cope with arising challenges in trust. Well known concepts from the domain of Trusted Computing can be applied to the example of mobile ad-hoc networks (MANETs) in order to establish extended trust capabilities between devices. The a...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Hauptverfasser: Oberle, Alexander, Rein, Andre, Kuntze, Nicolai, Rudolph, Carsten, Paatero, Janne, Lunn, Andrew, Racz, Peter
Format: Tagungsbericht
Sprache:eng
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 2374
container_issue
container_start_page 2369
container_title
container_volume
creator Oberle, Alexander
Rein, Andre
Kuntze, Nicolai
Rudolph, Carsten
Paatero, Janne
Lunn, Andrew
Racz, Peter
description Conventional network protocols and its security mechanisms fail to cope with arising challenges in trust. Well known concepts from the domain of Trusted Computing can be applied to the example of mobile ad-hoc networks (MANETs) in order to establish extended trust capabilities between devices. The approach of such an anchor of trust in MANETs shows interesting possibilities since no central instances such as Access Points are involved in those networks. The communication between directly connected devices of the network is protected by a cryptographic protocol making use of a Trusted Platform Module (TPM) that serves as root-of-trust on each device. Such a hardware chip allows devices to attest the local system state and assess states of remote systems. Building on this, transmission of routing and payload data can be restricted to devices in trustworthy states. The resulting mobile ad-hoc network, by using this protocol, is protected against many of today's security threats. Single malicious devices are automatically recognised and excluded from participation in the network by all devices. Especially the dissemination of misleading routing information, which affects the availability of the whole network, is effectively prevented by the developed protocol. Thus, it is shown that the device itself is secured by a hardware TPM. Also the communication is secured, by verifying the device's state between the counterparts.
doi_str_mv 10.1109/WCNC.2013.6554931
format Conference Proceeding
fullrecord <record><control><sourceid>ieee_6IE</sourceid><recordid>TN_cdi_ieee_primary_6554931</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>6554931</ieee_id><sourcerecordid>6554931</sourcerecordid><originalsourceid>FETCH-LOGICAL-i175t-96cdf0fac0aba55b0e73a58fa0e97bdeeef13344274c35da0fec42a8bf9a1ce13</originalsourceid><addsrcrecordid>eNo1kL1OwzAYRc2fRCl5AMTijSnBn3_ieKyiQiuVshQxVl8SuwSlcRW7Q9--Bcp0h3N0hkvIA7AMgJnnz3JZZpyByHKlpBFwQe5A5looI3RxSUagVJHyHPgVSYwu_lnBr38YV6lQALckCeGbMXZqagZyRGbzPtrNgLHtNzQO-xCpDRGrrg1fW9tH2vbR08Hvf4Xd4KOvfReodzT6Bg9Pgb5NltNVuCc3Drtgk_OOycfLdFXO0sX767ycLNIWtIqpyevGMYc1wwqVqpjVAlXhkFmjq8Za60AIKbmWtVANMmdrybGonEGoLYgxefzrtid3vRvaLQ6H9fkUcQSqbFLw</addsrcrecordid><sourcetype>Publisher</sourcetype><iscdi>true</iscdi><recordtype>conference_proceeding</recordtype></control><display><type>conference_proceeding</type><title>Integrating trust establishment into routing protocols of today's MANETs</title><source>IEEE Electronic Library (IEL) Conference Proceedings</source><creator>Oberle, Alexander ; Rein, Andre ; Kuntze, Nicolai ; Rudolph, Carsten ; Paatero, Janne ; Lunn, Andrew ; Racz, Peter</creator><creatorcontrib>Oberle, Alexander ; Rein, Andre ; Kuntze, Nicolai ; Rudolph, Carsten ; Paatero, Janne ; Lunn, Andrew ; Racz, Peter</creatorcontrib><description>Conventional network protocols and its security mechanisms fail to cope with arising challenges in trust. Well known concepts from the domain of Trusted Computing can be applied to the example of mobile ad-hoc networks (MANETs) in order to establish extended trust capabilities between devices. The approach of such an anchor of trust in MANETs shows interesting possibilities since no central instances such as Access Points are involved in those networks. The communication between directly connected devices of the network is protected by a cryptographic protocol making use of a Trusted Platform Module (TPM) that serves as root-of-trust on each device. Such a hardware chip allows devices to attest the local system state and assess states of remote systems. Building on this, transmission of routing and payload data can be restricted to devices in trustworthy states. The resulting mobile ad-hoc network, by using this protocol, is protected against many of today's security threats. Single malicious devices are automatically recognised and excluded from participation in the network by all devices. Especially the dissemination of misleading routing information, which affects the availability of the whole network, is effectively prevented by the developed protocol. Thus, it is shown that the device itself is secured by a hardware TPM. Also the communication is secured, by verifying the device's state between the counterparts.</description><identifier>ISSN: 1525-3511</identifier><identifier>ISBN: 9781467359382</identifier><identifier>ISBN: 1467359386</identifier><identifier>EISSN: 1558-2612</identifier><identifier>EISBN: 1467359378</identifier><identifier>EISBN: 1467359394</identifier><identifier>EISBN: 9781467359399</identifier><identifier>EISBN: 9781467359375</identifier><identifier>DOI: 10.1109/WCNC.2013.6554931</identifier><language>eng</language><publisher>IEEE</publisher><subject>Ad hoc networks ; Authentication ; Cryptography ; Mobile computing ; Protocols ; Routing</subject><ispartof>2013 IEEE Wireless Communications and Networking Conference (WCNC), 2013, p.2369-2374</ispartof><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/6554931$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>309,310,780,784,789,790,2058,27925,54920</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/6554931$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Oberle, Alexander</creatorcontrib><creatorcontrib>Rein, Andre</creatorcontrib><creatorcontrib>Kuntze, Nicolai</creatorcontrib><creatorcontrib>Rudolph, Carsten</creatorcontrib><creatorcontrib>Paatero, Janne</creatorcontrib><creatorcontrib>Lunn, Andrew</creatorcontrib><creatorcontrib>Racz, Peter</creatorcontrib><title>Integrating trust establishment into routing protocols of today's MANETs</title><title>2013 IEEE Wireless Communications and Networking Conference (WCNC)</title><addtitle>WCNC</addtitle><description>Conventional network protocols and its security mechanisms fail to cope with arising challenges in trust. Well known concepts from the domain of Trusted Computing can be applied to the example of mobile ad-hoc networks (MANETs) in order to establish extended trust capabilities between devices. The approach of such an anchor of trust in MANETs shows interesting possibilities since no central instances such as Access Points are involved in those networks. The communication between directly connected devices of the network is protected by a cryptographic protocol making use of a Trusted Platform Module (TPM) that serves as root-of-trust on each device. Such a hardware chip allows devices to attest the local system state and assess states of remote systems. Building on this, transmission of routing and payload data can be restricted to devices in trustworthy states. The resulting mobile ad-hoc network, by using this protocol, is protected against many of today's security threats. Single malicious devices are automatically recognised and excluded from participation in the network by all devices. Especially the dissemination of misleading routing information, which affects the availability of the whole network, is effectively prevented by the developed protocol. Thus, it is shown that the device itself is secured by a hardware TPM. Also the communication is secured, by verifying the device's state between the counterparts.</description><subject>Ad hoc networks</subject><subject>Authentication</subject><subject>Cryptography</subject><subject>Mobile computing</subject><subject>Protocols</subject><subject>Routing</subject><issn>1525-3511</issn><issn>1558-2612</issn><isbn>9781467359382</isbn><isbn>1467359386</isbn><isbn>1467359378</isbn><isbn>1467359394</isbn><isbn>9781467359399</isbn><isbn>9781467359375</isbn><fulltext>true</fulltext><rsrctype>conference_proceeding</rsrctype><creationdate>2013</creationdate><recordtype>conference_proceeding</recordtype><sourceid>6IE</sourceid><sourceid>RIE</sourceid><recordid>eNo1kL1OwzAYRc2fRCl5AMTijSnBn3_ieKyiQiuVshQxVl8SuwSlcRW7Q9--Bcp0h3N0hkvIA7AMgJnnz3JZZpyByHKlpBFwQe5A5looI3RxSUagVJHyHPgVSYwu_lnBr38YV6lQALckCeGbMXZqagZyRGbzPtrNgLHtNzQO-xCpDRGrrg1fW9tH2vbR08Hvf4Xd4KOvfReodzT6Bg9Pgb5NltNVuCc3Drtgk_OOycfLdFXO0sX767ycLNIWtIqpyevGMYc1wwqVqpjVAlXhkFmjq8Za60AIKbmWtVANMmdrybGonEGoLYgxefzrtid3vRvaLQ6H9fkUcQSqbFLw</recordid><startdate>201304</startdate><enddate>201304</enddate><creator>Oberle, Alexander</creator><creator>Rein, Andre</creator><creator>Kuntze, Nicolai</creator><creator>Rudolph, Carsten</creator><creator>Paatero, Janne</creator><creator>Lunn, Andrew</creator><creator>Racz, Peter</creator><general>IEEE</general><scope>6IE</scope><scope>6IL</scope><scope>CBEJK</scope><scope>RIE</scope><scope>RIL</scope></search><sort><creationdate>201304</creationdate><title>Integrating trust establishment into routing protocols of today's MANETs</title><author>Oberle, Alexander ; Rein, Andre ; Kuntze, Nicolai ; Rudolph, Carsten ; Paatero, Janne ; Lunn, Andrew ; Racz, Peter</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-i175t-96cdf0fac0aba55b0e73a58fa0e97bdeeef13344274c35da0fec42a8bf9a1ce13</frbrgroupid><rsrctype>conference_proceedings</rsrctype><prefilter>conference_proceedings</prefilter><language>eng</language><creationdate>2013</creationdate><topic>Ad hoc networks</topic><topic>Authentication</topic><topic>Cryptography</topic><topic>Mobile computing</topic><topic>Protocols</topic><topic>Routing</topic><toplevel>online_resources</toplevel><creatorcontrib>Oberle, Alexander</creatorcontrib><creatorcontrib>Rein, Andre</creatorcontrib><creatorcontrib>Kuntze, Nicolai</creatorcontrib><creatorcontrib>Rudolph, Carsten</creatorcontrib><creatorcontrib>Paatero, Janne</creatorcontrib><creatorcontrib>Lunn, Andrew</creatorcontrib><creatorcontrib>Racz, Peter</creatorcontrib><collection>IEEE Electronic Library (IEL) Conference Proceedings</collection><collection>IEEE Proceedings Order Plan All Online (POP All Online) 1998-present by volume</collection><collection>IEEE Xplore All Conference Proceedings</collection><collection>IEEE Electronic Library (IEL)</collection><collection>IEEE Proceedings Order Plans (POP All) 1998-Present</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Oberle, Alexander</au><au>Rein, Andre</au><au>Kuntze, Nicolai</au><au>Rudolph, Carsten</au><au>Paatero, Janne</au><au>Lunn, Andrew</au><au>Racz, Peter</au><format>book</format><genre>proceeding</genre><ristype>CONF</ristype><atitle>Integrating trust establishment into routing protocols of today's MANETs</atitle><btitle>2013 IEEE Wireless Communications and Networking Conference (WCNC)</btitle><stitle>WCNC</stitle><date>2013-04</date><risdate>2013</risdate><spage>2369</spage><epage>2374</epage><pages>2369-2374</pages><issn>1525-3511</issn><eissn>1558-2612</eissn><isbn>9781467359382</isbn><isbn>1467359386</isbn><eisbn>1467359378</eisbn><eisbn>1467359394</eisbn><eisbn>9781467359399</eisbn><eisbn>9781467359375</eisbn><abstract>Conventional network protocols and its security mechanisms fail to cope with arising challenges in trust. Well known concepts from the domain of Trusted Computing can be applied to the example of mobile ad-hoc networks (MANETs) in order to establish extended trust capabilities between devices. The approach of such an anchor of trust in MANETs shows interesting possibilities since no central instances such as Access Points are involved in those networks. The communication between directly connected devices of the network is protected by a cryptographic protocol making use of a Trusted Platform Module (TPM) that serves as root-of-trust on each device. Such a hardware chip allows devices to attest the local system state and assess states of remote systems. Building on this, transmission of routing and payload data can be restricted to devices in trustworthy states. The resulting mobile ad-hoc network, by using this protocol, is protected against many of today's security threats. Single malicious devices are automatically recognised and excluded from participation in the network by all devices. Especially the dissemination of misleading routing information, which affects the availability of the whole network, is effectively prevented by the developed protocol. Thus, it is shown that the device itself is secured by a hardware TPM. Also the communication is secured, by verifying the device's state between the counterparts.</abstract><pub>IEEE</pub><doi>10.1109/WCNC.2013.6554931</doi><tpages>6</tpages></addata></record>
fulltext fulltext_linktorsrc
identifier ISSN: 1525-3511
ispartof 2013 IEEE Wireless Communications and Networking Conference (WCNC), 2013, p.2369-2374
issn 1525-3511
1558-2612
language eng
recordid cdi_ieee_primary_6554931
source IEEE Electronic Library (IEL) Conference Proceedings
subjects Ad hoc networks
Authentication
Cryptography
Mobile computing
Protocols
Routing
title Integrating trust establishment into routing protocols of today's MANETs
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-28T17%3A12%3A19IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-ieee_6IE&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=proceeding&rft.atitle=Integrating%20trust%20establishment%20into%20routing%20protocols%20of%20today's%20MANETs&rft.btitle=2013%20IEEE%20Wireless%20Communications%20and%20Networking%20Conference%20(WCNC)&rft.au=Oberle,%20Alexander&rft.date=2013-04&rft.spage=2369&rft.epage=2374&rft.pages=2369-2374&rft.issn=1525-3511&rft.eissn=1558-2612&rft.isbn=9781467359382&rft.isbn_list=1467359386&rft_id=info:doi/10.1109/WCNC.2013.6554931&rft_dat=%3Cieee_6IE%3E6554931%3C/ieee_6IE%3E%3Curl%3E%3C/url%3E&rft.eisbn=1467359378&rft.eisbn_list=1467359394&rft.eisbn_list=9781467359399&rft.eisbn_list=9781467359375&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rft_ieee_id=6554931&rfr_iscdi=true