Abstract
Pervasive computing as a concept holds the promise of simplifying daily life by integrating mobile devices and digital infrastructures into our physical world. These devices in a pervasive environment would establish dynamic ad-hoc networks to provide ubiquitous services. The open and dynamic characteristics of pervasive environments necessitate the requirement for some form of trust assumptions to be made. Trust in this context not only includes authentication, confidentiality and privacy but also includes the belief that the devices and smart environment behave as expected. In this paper, we propose a trust enforced pervasive computing environment using the primitives provided by a TPM (Trusted Platform Module). The application scenario shows how critical information infrastructure such as services and data can be protected. In this smart environment, a person carrying a device authenticates to the environment in order to utilize its services. In this context the device and the smart environment can also test and check each other’s behaviors to better perform trust negotiation.
This work is partially supported under NFSC 60273049, 60303026 and 60473020. Both the primary and secondary authors’ work was done during their attachment to the Institute for Infocomm Research under its sponsorship.
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Abdul-Rahman, A., Hailes, S.: A distributed trust model. In: NSPW 1997: Proceedings of the 1997 Workshop on New Security Paradigms, pp. 48–60. ACM Press, New York (1997)
Abdul-Rahman, A., Hailes, S.: Supporting trust in virtual communities. In: HICSS 2000: Proceedings of the 33rd Hawaii International Conference on System Sciences, Washington, DC, USA, vol. 6, p. 6007. IEEE Computer Society, Los Alamitos (2000)
Abele-Wigert, I., Dunn, M.: International CIIP Handbook 2006, vol. II. Center for Security Studies, ETH Zurich (2006)
Almenßrez, F., Marn, A., Campo, C., Garcia, C.: Ptm: A pervasive trust management model for dynamic open environments. In: PSPT 2004: Proceedings of the 1st Workshop on Pervasive Security, Privacy and Trust in conjuntion with Mobiquitous 2004 (2004)
Bauer, L., Garriss, S., McCune, J.M., Reiter, M.K., Rouse, J., Rutenbar, P.: Device-enabled authorization in the grey system. In: Zhou, J., López, J., Deng, R.H., Bao, F. (eds.) ISC 2005. LNCS, vol. 3650, pp. 431–445. Springer, Heidelberg (2005)
Beth, T., Borcherding, M., Klein, B.: Valuation of trust in open networks. In: Gollmann, D. (ed.) ESORICS 1994. LNCS, vol. 875, pp. 3–18. Springer, Heidelberg (1994)
Blaze, M., Feigenbaum, J., Ioannidisand, J., Keromytis, A.D.: The keynote trust-management system, version 2 (1999)
Blaze, M., Feigenbaum, J., Lacy, J.: Decentralized trust management. In: SP 1996: Proceedings of the 1996 IEEE Symposium on Security and Privacy, p. 164. IEEE Computer Society, Los Alamitos (1996)
Blaze, M., Feigenbaum, J., Keromytis, A.D.: Keynote: Trust management for public-key infrastructures (position paper). In: Christianson, B., Crispo, B., Harbison, W.S., Roe, M. (eds.) Security Protocols 1998. LNCS, vol. 1550, pp. 59–63. Springer, Heidelberg (1999)
Gray, E., O’Connell, P., Jensen, C., Weber, S., Seigneur, J., Yong, C.: Towards a framework for assessing trust-based admission control in collaborative ad hoc applications (2002)
Haldar, V., Chandra, D., Franz, M.: Semantic remote attestation: A virtual machine directed approach to trusted computing. In: USENIX Virtual Machine Research and Technology Symposium (May 2004)
IETF. Simple public key infrastructure (SPKI) (February 2001)
Jøsang, A.: The right type of trust for distributed systems. In: NSPW 1996: Proceedings of the 1996 Workshop on New Security Paradigms, pp. 119–131. ACM Press, New York (1996)
Jøsang, A.: An algebra for assessing trust in certification chains. In: NDSS 1999: Proceedings of the Network and Distributed Systems Security (1999)
Jøsang, A., Knapskog, S.: A metric for trusted systems. In: Proceedings of the 21st National Security Conference, pp. 16–29 (1998)
Klein, B., Yahalom, R., Beth, T.: Trust relationships in secure systems - a distributed authentication perspective. In: RSP: IEEE Computer Society Symposium on Research in Security and Privacy (1993)
Marsh, S.: Formalising trust as a computational concept (1994)
Harrison McKnight, D., Chervany, N.L.: Trust and distrust definitions: One bite at a time. In: Trust in Cyber-societites, Integrating the Human and Artificial Perspectives, London, UK, pp. 27–54. Springer, Heidelberg (2000)
Neumann, P.G.: Architectures and formal representations for secure systems. Technical report (June 1996)
Sadeghi, A.-R., Christian, S.: Property-based attestation for computing platforms: caring about properties, not mechanisms. In: NSPW 2004: Proceedings of the 2004 Workshop on New Security Paradigms, pp. 67–77. ACM Press, New York (2004)
Samarati, P., De Capitani di Vimercati, S.: Access control: Policies, models, and mechanisms. In: FOSAD 2000: Revised versions of lectures given during the IFIP WG 1.7 International School on Foundations of Security Analysis and Design on Foundations of Security Analysis and Design, London, UK, pp. 137–196. Springer, Heidelberg (2000)
Shand, B., Dimmock, N., Bacon, J.: Trust for ubiquitous, transparent collaboration. Wirel. Netw. 10(6), 711–721 (2004)
Trusted Computing Group. TCG Infrastructure Workgroup Subject Key Attestation Evidence Extension, 1st edn. (June 2005)
Trusted Computing Group. TPM Main: Part 1 Design Principles, 1.2 edn. (2005)
Trusted Computing Group. TPM Main: Part 3 Commands (2005)
Zimmermann, P.: PGP source code and internals. MIT Press, Cambridge (1995)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2006 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Li, S., Balfe, S., Zhou, J., Chen, K. (2006). Enforcing Trust in Pervasive Computing with Trusted Computing Technology. In: Lopez, J. (eds) Critical Information Infrastructures Security. CRITIS 2006. Lecture Notes in Computer Science, vol 4347. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11962977_16
Download citation
DOI: https://doi.org/10.1007/11962977_16
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-69083-2
Online ISBN: 978-3-540-69084-9
eBook Packages: Computer ScienceComputer Science (R0)