Trust Negotiation Protocol Support for Secure Mobile Network Service Deployment

نویسندگان

  • Daniel Díaz Sánchez
  • Andrés Marín López
  • Florina Almenárez Mendoza
  • Celeste Campo
  • Alberto Cortés
  • Carlos García-Rubio
چکیده

User-centric services might enforce requirements difficult to be endorsed by visited networks unless tight coupled trust relations are previously established among providers. Maintaining those fixed trust relations is costly and unmanageable if the number of providers increases. Moreover, it requires providers to use a common security model, credentials, policies. . . . Trust Negotiation can be the solution to this problem since allows to negotiate gradually a security state enabling multiple factor authentication and authorization even for “strangers” by exchanging various credentials. However, there are still two problems to solve, the first one is the delay introduced by the trust negotiation messages if used as bootstrapping in every interaction; the second one is the lack of protocol support. In this article we address those problems by presenting an extension to TLS that enables trust negotiation and credential issuing (to speed-up following interactions) over a secure channel.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Dynamic network-based secure VPN deployment in GPRS

A dynamic network-based Virtual Private Network (VPN) deployment, which is established between the General Packet Radio Services (GPRS) border gateway and a corporate Intranet gateway, is presented and analyzed. By relying on a sequence of concatenated protection mechanisms (GPRS ciphering and VPN deployment), it is possible to provide secure remote access to mobile users without requiring an e...

متن کامل

Formal Specifications of Trusted OLSR Protocol of Ad hoc Network in Z

A Mobile Ad hoc Network is a network of mobile nodes operating in an infrastructure-less network. These nodes not have the defense rendered by firewalls in infrastructure-based networks. Trust oriented system aids to improvise this situation. So, the incorporation of trust in routing decisions yields a more secure and reliable framework for such type of networks. As if any suggested model does ...

متن کامل

Secure and reliable certificate chains recovery protocol for mobile ad hoc networks

The deployment of any security policy requires the definition of a trust model that defines who trusts who and how. There is a host of research efforts in the trustworthy area to securing mobile ad hoc networks. Among the most used approaches are based on public-key certificates and gave birth to miscellaneous trust models ranging from centralized models to web-of-trust and distributed certific...

متن کامل

Surrogate Trust Negotiation : Solving Authentication and Authorization Issues in Dynamic Mobile Networks

SURROGATE TRUST NEGOTIATION: SOLVING AUTHENTICATION AND AUTHORIZATION ISSUES IN DYNAMIC MOBILE NETWORKS Tore L. Sundelin Department of Computer Science Master of Science This research describes a system that brings non-identity based authentication and authorization services to resource-constrained, wireless devices. This system extends the nascent technology of automated trust negotiation via ...

متن کامل

Secure Routing Protocol: Affection on MANETs Performance

In mobile ad hoc networks, the absence ofinfrastructure and the consequent absence of authorizationfacilities impede the usual practice of establishing a practicalcriterion to distinguishing nodes as trusted and distrusted.Since all nodes in the MANETs would be used as router inmulti-hop applications, secure routing protocols have vital rulein the security of the network. So evaluating the perf...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2008