Visible to the public Biblio

Filters: Author is Adi, W.  [Clear All Filters]
2018-02-14
Mulhem, S., Adi, W., Mars, A., Prevelakis, V..  2017.  Chaining trusted links by deploying secured physical identities. 2017 Seventh International Conference on Emerging Security Technologies (EST). :215–220.
Efficient trust management between nodes in a huge network is an essential requirement in modern networks. This work shows few generic primitive protocols for creating a trusted link between nodes by deploying unclonable physical tokens as Secret Unknown Ciphers. The proposed algorithms are making use of the clone-resistant physical identity of each participating node. Several generic node authentication protocols are presented. An intermediate node is shown to be usable as a mediator to build trust without having influence on the resulting security chain. The physical clone-resistant identities are using our early concept of Secret Unknown Cipher (SUC) technique. The main target of this work is to show the particular and efficient trust-chaining in large networks when SUC techniques are involved.