Title | MACH-2K Architecture: Building Mobile Device Trust and Utility for Emergency Response Networks |
Publication Type | Conference Paper |
Year of Publication | 2019 |
Authors | Thurston, K. H., Leon, D. Conte de |
Conference Name | 2019 IEEE 16th International Conference on Mobile Ad Hoc and Sensor Systems Workshops (MASSW) |
Keywords | Ad hoc networks, Architecture, building mobile device trust, building resiliency, Buildings, communication utility patterns, compositionality, Computer architecture, crowd sensing, cryptography, data privacy, emergency management, emergency response networks, emergency services, History, MACH 2K, MACH-2K trust overlay network architecture, MANET, manet privacy, message confidentiality, Metrics, mobile ad hoc networks, Mobile handsets, Network, Organizations, overlay networks, Peer-to-peer computing, private mobile devices, pubcrawl, public service networks, Resiliency, security, telecommunication security, Trust, vpn |
Abstract | In this article, we introduce the MACH-2K trust overlay network and its architecture. MACH-2K's objectives are to (a) enhance the resiliency of emergency response and public service networks and (b) help build such networks in places, or at times, where network infrastructure is limited. Resiliency may be enhanced in an economic manner by building new ad hoc networks of private mobile devices and joining these to public service networks at specific trusted points. The major barrier to building resiliency by using private devices is ensuring security. MACH-2K uses device location and communication utility patterns to assign trust to devices, after owner approval. After trust is established, message confidentiality, privacy, and integrity may be implemented by well-known cryptographic means. MACH-2K devices may be then requested to forward or consume different types of messages depending on their current level of trust and utility. |
DOI | 10.1109/MASSW.2019.00037 |
Citation Key | thurston_mach-2k_2019 |