Skip to main content

Self Attestation of Things (Transcript of Discussion)

  • Conference paper
  • First Online:
Security Protocols XXV (Security Protocols 2017)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 10476))

Included in the following conference series:

  • 573 Accesses

Abstract

This is a picture of the Panopticon. I live in a world now, where everybody can observe me without me knowing when I am being observed and when not. So, that’s the threat model I’m primarily aiming at. Last year I was working for a large software company. They had an insurance company as their client. They were trying to get data on people out of the on-board diagnostics. Not only the speed, et cetera, to do pay-as-you-drive insurance, but also the location information from the on-board diagnostics. This is similar to the government U-turn on health privacy that we heard about from Ross. And most of the times, the software that lies in my car (or in my toaster) I do not own or control. It’s owned by the company who manufactured it. Like, the Jeeps that John Deere manufactures, they say that the software is owned by them. The user has no access, no control, nothing to do with it. But forensics is a important concern. If my car (or my toaster) happens to kill me, then the investigator should be able to find out exactly what happened when I was murdered.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    e.g. investigations.

  2. 2.

    Association of Chief Police Officers, UK Forensic guidelines.

  3. 3.

    Feigenbaum and Ford, these proceedings.

  4. 4.

    Wernick and Christianson, 2016, “The Price of Belief : Insuring Credible Trust”, Security Protocols xxiv, discussion.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Partha Das Chowdhury .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer International Publishing AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Das Chowdhury, P. (2017). Self Attestation of Things (Transcript of Discussion). In: Stajano, F., Anderson, J., Christianson, B., Matyáš, V. (eds) Security Protocols XXV. Security Protocols 2017. Lecture Notes in Computer Science(), vol 10476. Springer, Cham. https://doi.org/10.1007/978-3-319-71075-4_10

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-71075-4_10

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-71074-7

  • Online ISBN: 978-3-319-71075-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics