首页> 外文会议>IEEE Wireless Communications and Networking Conference >Integrating trust establishment into routing protocols of today's MANETs
【24h】

Integrating trust establishment into routing protocols of today's MANETs

机译:将信任建立集成到当今MANET的路由协议中

获取原文

摘要

Conventional network protocols and its security mechanisms fail to cope with arising challenges in trust. Well known concepts from the domain of Trusted Computing can be applied to the example of mobile ad-hoc networks (MANETs) in order to establish extended trust capabilities between devices. The approach of such an anchor of trust in MANETs shows interesting possibilities since no central instances such as Access Points are involved in those networks. The communication between directly connected devices of the network is protected by a cryptographic protocol making use of a Trusted Platform Module (TPM) that serves as root-of-trust on each device. Such a hardware chip allows devices to attest the local system state and assess states of remote systems. Building on this, transmission of routing and payload data can be restricted to devices in trustworthy states. The resulting mobile ad-hoc network, by using this protocol, is protected against many of today's security threats. Single malicious devices are automatically recognised and excluded from participation in the network by all devices. Especially the dissemination of misleading routing information, which affects the availability of the whole network, is effectively prevented by the developed protocol. Thus, it is shown that the device itself is secured by a hardware TPM. Also the communication is secured, by verifying the device's state between the counterparts.
机译:常规的网络协议及其安全机制无法应对信任方面出现的挑战。可以将来自可信计算领域的众所周知的概念应用于移动自组织网络(MANET)的示例,以便在设备之间建立扩展的信任能力。在MANET中这种信任锚的方法显示出有趣的可能性,因为这些网络中没有涉及接入点的中心实例。网络的直接连接的设备之间的通信受使用受信任平台模块(TPM)的加密协议保护,该模块充当每个设备上的信任根。这种硬件芯片允许设备证明本地系统状态并评估远程系统的状态。在此基础上,可以将路由和有效负载数据的传输限制为处于可信任状态的设备。通过使用此协议,最终的移动自组织网络可免受当今许多安全威胁的侵害。单个恶意设备会自动被所有设备识别,并被排除在网络之外。尤其是,已开发的协议可以有效地防止误导路由信息的传播,而这种误导性路由信息会影响整个网络的可用性。因此,显示出设备本身由硬件TPM保护。通过验证对方之间的设备状态,也可以确保通信的安全。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号