Visible to the public Chaining trusted links by deploying secured physical identities

TitleChaining trusted links by deploying secured physical identities
Publication TypeConference Paper
Year of Publication2017
AuthorsMulhem, S., Adi, W., Mars, A., Prevelakis, V.
Conference Name2017 Seventh International Conference on Emerging Security Technologies (EST)
Keywordsauthentication, Ciphers, clone-resistant physical identity, cryptographic protocols, cryptography, generic node authentication protocols, Human Behavior, Identity management, intermediate node, Internet of Things, Object recognition, physical clone-resistant identities, Protocols, pubcrawl, Resiliency, Scalability, secret unknown ciphers, Secret Unkown Cipher, secured physical identities, security chain, security of data, smart devices, Trust Chaining by Physical Tokens, Trust management, trusted link, trusted links, unclonable physical tokens
AbstractEfficient trust management between nodes in a huge network is an essential requirement in modern networks. This work shows few generic primitive protocols for creating a trusted link between nodes by deploying unclonable physical tokens as Secret Unknown Ciphers. The proposed algorithms are making use of the clone-resistant physical identity of each participating node. Several generic node authentication protocols are presented. An intermediate node is shown to be usable as a mediator to build trust without having influence on the resulting security chain. The physical clone-resistant identities are using our early concept of Secret Unknown Cipher (SUC) technique. The main target of this work is to show the particular and efficient trust-chaining in large networks when SUC techniques are involved.
DOI10.1109/EST.2017.8090426
Citation Keymulhem_chaining_2017