Schematize Trust Overlays and Management for Privacy Preservation in MANET

Mobile ad hoc Networks refers to the infrastructure less, resource poor wireless networks whose interaction is unplanned in such a way that location of participating nodes and parties can not be identifiable. The mobile devices are used by people to access services in various environments. Before two or more mobile networks ready to interact, they must trust that each will satisfy the security and privacy requirements of the other. In this paper, we schematize the role of trust overlays and its management, a systematic approach to build such trust overlay in MANET for privacy preservation. Our solution exploits the increasing availability of trusted computing hardware on open systems, including portable computers and mobile devices. Our proposal has emphasized that key pieces of these solutions are coming into a common place, as all mobile devices provide distributed mandatory access control. We also point out that tremendous challenges remain, such as how to set compatible security policies across administrative domains and how to derive a trust coefficient to build trust in MANET.

[1]  Mahadev Satyanarayanan,et al.  Internet suspend/resume , 2002, Proceedings Fourth IEEE Workshop on Mobile Computing Systems and Applications.

[2]  Angelos D. Keromytis,et al.  Design and implementation of virtual private services , 2003, WET ICE 2003. Proceedings. Twelfth IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises, 2003..

[3]  丸山 宏,et al.  安全なジョブの遠隔実行を可能にするTrusted Platform on demand , 2004 .

[4]  Ramón Cáceres,et al.  Reincarnating PCs with portable SoulPads , 2005, MobiSys '05.

[5]  David P. Anderson,et al.  BOINC: a system for public-resource computing and storage , 2004, Fifth IEEE/ACM International Workshop on Grid Computing.

[6]  Michael Franz,et al.  Semantic remote attestation: a virtual machine directed approach to trusted computing , 2004 .

[7]  Andrew Warfield,et al.  Xen and the art of virtualization , 2003, SOSP '03.

[8]  Durgesh Kumar Mishra,et al.  Privacy Preserving k Secure Sum Protocol , 2009, ArXiv.

[9]  Stefan Berger,et al.  Building a MAC-based security architecture for the Xen open-source hypervisor , 2005, 21st Annual Computer Security Applications Conference (ACSAC'05).

[10]  Trent Jaeger,et al.  Design and Implementation of a TCG-based Integrity Measurement Architecture , 2004, USENIX Security Symposium.

[11]  Stefan Berger,et al.  IBM Research Report DeuTeRiuM - A System for Distributed Mandatory Access Control , 2006 .

[12]  Sean W. Smith,et al.  Building the IBM 4758 Secure Coprocessor , 2001, Computer.

[13]  Trent Jaeger,et al.  Trusted virtual domains: toward secure distributed services , 2005 .

[14]  Ahmad-Reza Sadeghi,et al.  Property-based attestation for computing platforms: caring about properties, not mechanisms , 2004, NSPW '04.

[15]  Tal Garfinkel,et al.  Terra: a virtual machine-based platform for trusted computing , 2003, SOSP '03.