Integrity based relationships and trustworthy communication between network participants
Title | Integrity based relationships and trustworthy communication between network participants |
Publication Type | Conference Paper |
Year of Publication | 2014 |
Authors | Oberle, A., Larbig, P., Kuntze, N., Rudolph, C. |
Conference Name | Communications (ICC), 2014 IEEE International Conference on |
Date Published | June |
Keywords | authenticated node, authentication, authentication protocol, computer network security, cryptographic protocols, Cyber-physical systems, Encryption, industrial networks, insider threat, integrity, integrity based relationship, network participants, operating system integrity, OSI layer 2, participating node, Payloads, protocol design, Protocols, security, Servers, Trust, trust establishment, Trusted Computing, Trusted Platform Module, trustworthy communication, Unicast |
Abstract | Establishing trust relationships between network participants by having them prove their operating system's integrity via a Trusted Platform Module (TPM) provides interesting approaches for securing local networks at a higher level. In the introduced approach on OSI layer 2, attacks carried out by already authenticated and participating nodes (insider threats) can be detected and prevented. Forbidden activities and manipulations in hard- and software, such as executing unknown binaries, loading additional kernel modules or even inserting unauthorized USB devices, are detected and result in an autonomous reaction of each network participant. The provided trust establishment and authentication protocol operates independently from upper protocol layers and is optimized for resource constrained machines. Well known concepts of backbone architectures can maintain the chain of trust between different kinds of network types. Each endpoint, forwarding and processing unit monitors the internal network independently and reports misbehaviours autonomously to a central instance in or outside of the trusted network. |
URL | https://ieeexplore.ieee.org/document/6883386 |
DOI | 10.1109/ICC.2014.6883386 |
Citation Key | 6883386 |
- OSI layer 2
- Unicast
- trustworthy communication
- Trusted Platform Module
- Trusted Computing
- trust establishment
- trust
- Servers
- security
- Protocols
- protocol design
- Payloads
- participating node
- authenticated node
- operating system integrity
- network participants
- integrity based relationship
- integrity
- insider threat
- industrial networks
- encryption
- cyber-physical systems
- Cryptographic Protocols
- computer network security
- authentication protocol
- authentication