Reliable Identities Using Off-the-Shelf Hardware Security in MANETs

Application scenarios for mobile ad-hoc networks (MANETs) impose a variety of non-standard security requirements. Furthermore, in many scenarios owner and user of devices do not always have physical control over the device. Therefore,security in MANETs should be rooted in hardware security anchors. For current PC architectures a relatively cheap hardware anchor is readily available, the so-called trusted platform module TPM as standardized by the Trusted computingGroup. This paper shows that TPMs can provide the basis for rather complex security mechanisms that can support a variety of security properties in MANETs. In addition to straightforward requirements like authenticity or confidential storage of data on the device, also more complicated requirements like unlinkability of multiple identities or restrictions to the validity of identitycertificates are discussed.

[1]  Paul Ward,et al.  Trusted computing for protecting ad-hoc routing , 2006, 4th Annual Communication Networks and Services Research Conference (CNSR'06).

[2]  Stefan Katzenbeisser,et al.  Improving the scalability of platform attestation , 2008, STC '08.

[3]  Ronald Perez,et al.  Linking remote attestation to secure tunnel endpoints , 2006, STC '06.

[4]  Ravi S. Sandhu,et al.  Peer-to-peer access control architecture using trusted computing technology , 2005, SACMAT '05.

[5]  Kenneth G. Paterson,et al.  Trusted computing: providing security for peer-to-peer networks , 2005, Fifth IEEE International Conference on Peer-to-Peer Computing (P2P'05).

[6]  Siani Pearson Trusted Computing Platforms , the Next Security Solution , 2002 .

[7]  Luiz A. DaSilva,et al.  Authentication protocols for ad hoc networks: taxonomy and research issues , 2005, Q2SWinet '05.

[8]  Dharma P. Agrawal,et al.  A novel authentication scheme for ad hoc networks , 2000, 2000 IEEE Wireless Communications and Networking Conference. Conference Record (Cat. No.00TH8540).

[9]  Michael D. Smith,et al.  Trusted Computing, Peer-to-Peer Distribution, and The Economics of Pirated Entertainment , 2004, Economics of Information Security.

[10]  Helen Tang,et al.  Strong Authentication for Tactical Mobile Ad Hoc Networks , 2007 .

[11]  Kenneth G. Paterson,et al.  Key Refreshing in Identity-Based Cryptography and its Applications in MANETs , 2007, MILCOM 2007 - IEEE Military Communications Conference.