Skip to main content

Enforcing Trust in Pervasive Computing with Trusted Computing Technology

  • Conference paper
Critical Information Infrastructures Security (CRITIS 2006)

Part of the book series: Lecture Notes in Computer Science ((LNCCN,volume 4347))

  • 693 Accesses

Abstract

Pervasive computing as a concept holds the promise of simplifying daily life by integrating mobile devices and digital infrastructures into our physical world. These devices in a pervasive environment would establish dynamic ad-hoc networks to provide ubiquitous services. The open and dynamic characteristics of pervasive environments necessitate the requirement for some form of trust assumptions to be made. Trust in this context not only includes authentication, confidentiality and privacy but also includes the belief that the devices and smart environment behave as expected. In this paper, we propose a trust enforced pervasive computing environment using the primitives provided by a TPM (Trusted Platform Module). The application scenario shows how critical information infrastructure such as services and data can be protected. In this smart environment, a person carrying a device authenticates to the environment in order to utilize its services. In this context the device and the smart environment can also test and check each other’s behaviors to better perform trust negotiation.

This work is partially supported under NFSC 60273049, 60303026 and 60473020. Both the primary and secondary authors’ work was done during their attachment to the Institute for Infocomm Research under its sponsorship.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Abdul-Rahman, A., Hailes, S.: A distributed trust model. In: NSPW 1997: Proceedings of the 1997 Workshop on New Security Paradigms, pp. 48–60. ACM Press, New York (1997)

    Chapter  Google Scholar 

  2. Abdul-Rahman, A., Hailes, S.: Supporting trust in virtual communities. In: HICSS 2000: Proceedings of the 33rd Hawaii International Conference on System Sciences, Washington, DC, USA, vol. 6, p. 6007. IEEE Computer Society, Los Alamitos (2000)

    Google Scholar 

  3. Abele-Wigert, I., Dunn, M.: International CIIP Handbook 2006, vol. II. Center for Security Studies, ETH Zurich (2006)

    Google Scholar 

  4. Almenßrez, F., Marn, A., Campo, C., Garcia, C.: Ptm: A pervasive trust management model for dynamic open environments. In: PSPT 2004: Proceedings of the 1st Workshop on Pervasive Security, Privacy and Trust in conjuntion with Mobiquitous 2004 (2004)

    Google Scholar 

  5. Bauer, L., Garriss, S., McCune, J.M., Reiter, M.K., Rouse, J., Rutenbar, P.: Device-enabled authorization in the grey system. In: Zhou, J., López, J., Deng, R.H., Bao, F. (eds.) ISC 2005. LNCS, vol. 3650, pp. 431–445. Springer, Heidelberg (2005)

    Chapter  Google Scholar 

  6. Beth, T., Borcherding, M., Klein, B.: Valuation of trust in open networks. In: Gollmann, D. (ed.) ESORICS 1994. LNCS, vol. 875, pp. 3–18. Springer, Heidelberg (1994)

    Google Scholar 

  7. Blaze, M., Feigenbaum, J., Ioannidisand, J., Keromytis, A.D.: The keynote trust-management system, version 2 (1999)

    Google Scholar 

  8. Blaze, M., Feigenbaum, J., Lacy, J.: Decentralized trust management. In: SP 1996: Proceedings of the 1996 IEEE Symposium on Security and Privacy, p. 164. IEEE Computer Society, Los Alamitos (1996)

    Chapter  Google Scholar 

  9. Blaze, M., Feigenbaum, J., Keromytis, A.D.: Keynote: Trust management for public-key infrastructures (position paper). In: Christianson, B., Crispo, B., Harbison, W.S., Roe, M. (eds.) Security Protocols 1998. LNCS, vol. 1550, pp. 59–63. Springer, Heidelberg (1999)

    Chapter  Google Scholar 

  10. Gray, E., O’Connell, P., Jensen, C., Weber, S., Seigneur, J., Yong, C.: Towards a framework for assessing trust-based admission control in collaborative ad hoc applications (2002)

    Google Scholar 

  11. Haldar, V., Chandra, D., Franz, M.: Semantic remote attestation: A virtual machine directed approach to trusted computing. In: USENIX Virtual Machine Research and Technology Symposium (May 2004)

    Google Scholar 

  12. IETF. Simple public key infrastructure (SPKI) (February 2001)

    Google Scholar 

  13. Jøsang, A.: The right type of trust for distributed systems. In: NSPW 1996: Proceedings of the 1996 Workshop on New Security Paradigms, pp. 119–131. ACM Press, New York (1996)

    Chapter  Google Scholar 

  14. Jøsang, A.: An algebra for assessing trust in certification chains. In: NDSS 1999: Proceedings of the Network and Distributed Systems Security (1999)

    Google Scholar 

  15. Jøsang, A., Knapskog, S.: A metric for trusted systems. In: Proceedings of the 21st National Security Conference, pp. 16–29 (1998)

    Google Scholar 

  16. Klein, B., Yahalom, R., Beth, T.: Trust relationships in secure systems - a distributed authentication perspective. In: RSP: IEEE Computer Society Symposium on Research in Security and Privacy (1993)

    Google Scholar 

  17. Marsh, S.: Formalising trust as a computational concept (1994)

    Google Scholar 

  18. Harrison McKnight, D., Chervany, N.L.: Trust and distrust definitions: One bite at a time. In: Trust in Cyber-societites, Integrating the Human and Artificial Perspectives, London, UK, pp. 27–54. Springer, Heidelberg (2000)

    Google Scholar 

  19. Neumann, P.G.: Architectures and formal representations for secure systems. Technical report (June 1996)

    Google Scholar 

  20. Sadeghi, A.-R., Christian, S.: Property-based attestation for computing platforms: caring about properties, not mechanisms. In: NSPW 2004: Proceedings of the 2004 Workshop on New Security Paradigms, pp. 67–77. ACM Press, New York (2004)

    Google Scholar 

  21. Samarati, P., De Capitani di Vimercati, S.: Access control: Policies, models, and mechanisms. In: FOSAD 2000: Revised versions of lectures given during the IFIP WG 1.7 International School on Foundations of Security Analysis and Design on Foundations of Security Analysis and Design, London, UK, pp. 137–196. Springer, Heidelberg (2000)

    Google Scholar 

  22. Shand, B., Dimmock, N., Bacon, J.: Trust for ubiquitous, transparent collaboration. Wirel. Netw. 10(6), 711–721 (2004)

    Article  Google Scholar 

  23. Trusted Computing Group. TCG Infrastructure Workgroup Subject Key Attestation Evidence Extension, 1st edn. (June 2005)

    Google Scholar 

  24. Trusted Computing Group. TPM Main: Part 1 Design Principles, 1.2 edn. (2005)

    Google Scholar 

  25. Trusted Computing Group. TPM Main: Part 3 Commands (2005)

    Google Scholar 

  26. Zimmermann, P.: PGP source code and internals. MIT Press, Cambridge (1995)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2006 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Li, S., Balfe, S., Zhou, J., Chen, K. (2006). Enforcing Trust in Pervasive Computing with Trusted Computing Technology. In: Lopez, J. (eds) Critical Information Infrastructures Security. CRITIS 2006. Lecture Notes in Computer Science, vol 4347. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11962977_16

Download citation

  • DOI: https://doi.org/10.1007/11962977_16

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-69083-2

  • Online ISBN: 978-3-540-69084-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics