Trust Negotiation Protocol Support for Secure Mobile Network Service Deployment
نویسندگان
چکیده
User-centric services might enforce requirements difficult to be endorsed by visited networks unless tight coupled trust relations are previously established among providers. Maintaining those fixed trust relations is costly and unmanageable if the number of providers increases. Moreover, it requires providers to use a common security model, credentials, policies. . . . Trust Negotiation can be the solution to this problem since allows to negotiate gradually a security state enabling multiple factor authentication and authorization even for “strangers” by exchanging various credentials. However, there are still two problems to solve, the first one is the delay introduced by the trust negotiation messages if used as bootstrapping in every interaction; the second one is the lack of protocol support. In this article we address those problems by presenting an extension to TLS that enables trust negotiation and credential issuing (to speed-up following interactions) over a secure channel.
منابع مشابه
Dynamic network-based secure VPN deployment in GPRS
A dynamic network-based Virtual Private Network (VPN) deployment, which is established between the General Packet Radio Services (GPRS) border gateway and a corporate Intranet gateway, is presented and analyzed. By relying on a sequence of concatenated protection mechanisms (GPRS ciphering and VPN deployment), it is possible to provide secure remote access to mobile users without requiring an e...
متن کاملFormal Specifications of Trusted OLSR Protocol of Ad hoc Network in Z
A Mobile Ad hoc Network is a network of mobile nodes operating in an infrastructure-less network. These nodes not have the defense rendered by firewalls in infrastructure-based networks. Trust oriented system aids to improvise this situation. So, the incorporation of trust in routing decisions yields a more secure and reliable framework for such type of networks. As if any suggested model does ...
متن کاملSecure and reliable certificate chains recovery protocol for mobile ad hoc networks
The deployment of any security policy requires the definition of a trust model that defines who trusts who and how. There is a host of research efforts in the trustworthy area to securing mobile ad hoc networks. Among the most used approaches are based on public-key certificates and gave birth to miscellaneous trust models ranging from centralized models to web-of-trust and distributed certific...
متن کاملSurrogate Trust Negotiation : Solving Authentication and Authorization Issues in Dynamic Mobile Networks
SURROGATE TRUST NEGOTIATION: SOLVING AUTHENTICATION AND AUTHORIZATION ISSUES IN DYNAMIC MOBILE NETWORKS Tore L. Sundelin Department of Computer Science Master of Science This research describes a system that brings non-identity based authentication and authorization services to resource-constrained, wireless devices. This system extends the nascent technology of automated trust negotiation via ...
متن کاملSecure Routing Protocol: Affection on MANETs Performance
In mobile ad hoc networks, the absence ofinfrastructure and the consequent absence of authorizationfacilities impede the usual practice of establishing a practicalcriterion to distinguishing nodes as trusted and distrusted.Since all nodes in the MANETs would be used as router inmulti-hop applications, secure routing protocols have vital rulein the security of the network. So evaluating the perf...
متن کامل