Secure Information Flow in Mobile Bootstrapping Process

نویسندگان

  • Zhaoyu Liu
  • M. Dennis Mickunas
  • Roy H. Campbell
چکیده

The se urity of bootstrapping is very important for mobile omputing. In this paper, we present the bootstrapping pro ess of the Cherubim se urity system whi h uses a smart ard to allow a mobile Cherubim lient to universally a ess remote standard servi es. In order to prevent any leakage of sensitive information, we apply a type system for se ure ows to the bootstrapping sour e odes. The type system guarantees that well-typed programs satisfy a noninterferen e se urity property. This means that the program does not \leak" sensitive data. The type system also produ es prin ipal types for typeorre t programs that hara terize how programs an be alled se urely. The analysis demonstrates that the type system an ensure se ure ow enfor ement.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A comparative study of secure device pairing methods

‘‘Secure Device Pairing’’ or ‘‘Secure First Connect’’ is the process of bootstrapping a secure channel between two previously unassociated devices over some (usually wireless) human-imperceptible communication channel. Absence of prior security context and common trust infrastructure open the door for the so-called Man-in-the-Middle and Evil Twin attacks. Mitigation of these attacks requires so...

متن کامل

Secure Routing Protocol: Affection on MANETs Performance

In mobile ad hoc networks, the absence ofinfrastructure and the consequent absence of authorizationfacilities impede the usual practice of establishing a practicalcriterion to distinguishing nodes as trusted and distrusted.Since all nodes in the MANETs would be used as router inmulti-hop applications, secure routing protocols have vital rulein the security of the network. So evaluating the perf...

متن کامل

RFC 4640 PS Bootstrapping

Status of This Memo This memo provides information for the Internet community. It does not specify an Internet standard of any kind. Distribution of this memo is unlimited. Abstract A mobile node needs at least the following information: a home address, a home agent address, and a security association with home agent to register with the home agent. The process of obtaining this information is ...

متن کامل

An Incentive-Aware Lightweight Secure Data Sharing Scheme for D2D Communication in 5G Cellular Networks

Due to the explosion of smart devices, data traffic over cellular networks has seen an exponential rise in recent years. This increase in mobile data traffic has caused an immediate need for offloading traffic from operators. Device-to-Device(D2D) communication is a promising solution to boost the capacity of cellular networks and alleviate the heavy burden on backhaul links. However, dir...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2000