Visible to the public Integrity based relationships and trustworthy communication between network participants

TitleIntegrity based relationships and trustworthy communication between network participants
Publication TypeConference Paper
Year of Publication2014
AuthorsOberle, A., Larbig, P., Kuntze, N., Rudolph, C.
Conference NameCommunications (ICC), 2014 IEEE International Conference on
Date PublishedJune
Keywordsauthenticated node, authentication, authentication protocol, computer network security, cryptographic protocols, Cyber-physical systems, Encryption, industrial networks, insider threat, integrity, integrity based relationship, network participants, operating system integrity, OSI layer 2, participating node, Payloads, protocol design, Protocols, security, Servers, Trust, trust establishment, Trusted Computing, Trusted Platform Module, trustworthy communication, Unicast
Abstract

Establishing trust relationships between network participants by having them prove their operating system's integrity via a Trusted Platform Module (TPM) provides interesting approaches for securing local networks at a higher level. In the introduced approach on OSI layer 2, attacks carried out by already authenticated and participating nodes (insider threats) can be detected and prevented. Forbidden activities and manipulations in hard- and software, such as executing unknown binaries, loading additional kernel modules or even inserting unauthorized USB devices, are detected and result in an autonomous reaction of each network participant. The provided trust establishment and authentication protocol operates independently from upper protocol layers and is optimized for resource constrained machines. Well known concepts of backbone architectures can maintain the chain of trust between different kinds of network types. Each endpoint, forwarding and processing unit monitors the internal network independently and reports misbehaviours autonomously to a central instance in or outside of the trusted network.

URLhttps://ieeexplore.ieee.org/document/6883386
DOI10.1109/ICC.2014.6883386
Citation Key6883386