Demo: Zero touch configuration

Nicolai Kuntze, Pedro Larbig, Carsten Rudolph

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearch

1 Citation (Scopus)

Abstract

The deployment of devices at remote or distributed locations is a typical scenario e.g. in large enterprise networks or industrial applications. In the deployment of a device identification of the device and the establishment of security relations (trust) between the device and other elements of the infrastructure is crucial. Usually, the process requires either to pre-configure the device or to let administrators physically access the device for configuration. Both options induce costs. For functional configurations and software distribution zero configuration solutions are available. One important step hereby is the establishment of trust into the individual device by the device owner. This trust establishment requires in typical schemes a large organizational involvement of the device owner resp. operator. The approach presented in this demo addresses the step of initial trust establishment. The demonstration shows the process of a device being securely configured and provides a visualization through a meta-data graph generated from an IF-MAP server.

Original languageEnglish
Title of host publicationProceedings of the 2013 IFIP/IEEE International Symposium on Integrated Network Management, IM 2013
PublisherIEEE, Institute of Electrical and Electronics Engineers
Pages1076-1077
Number of pages2
ISBN (Print)9783901882517
Publication statusPublished - 2013
Externally publishedYes
EventIFIP/IEEE International Symposium on Integrated Network Management (IM) 2013 - Ghent University, Ghent, Belgium
Duration: 27 May 201331 May 2013
Conference number: 13th
https://www.ieee.org/conferences_events/conferences/conferencedetails/index.htm?Conf_ID=19921

Conference

ConferenceIFIP/IEEE International Symposium on Integrated Network Management (IM) 2013
Abbreviated titleIM 2013
CountryBelgium
CityGhent
Period27/05/1331/05/13
Internet address

Cite this

Kuntze, N., Larbig, P., & Rudolph, C. (2013). Demo: Zero touch configuration. In Proceedings of the 2013 IFIP/IEEE International Symposium on Integrated Network Management, IM 2013 (pp. 1076-1077). [6573136] IEEE, Institute of Electrical and Electronics Engineers.
Kuntze, Nicolai ; Larbig, Pedro ; Rudolph, Carsten. / Demo : Zero touch configuration. Proceedings of the 2013 IFIP/IEEE International Symposium on Integrated Network Management, IM 2013. IEEE, Institute of Electrical and Electronics Engineers, 2013. pp. 1076-1077
@inproceedings{415a4f2c7b594066b4e41e9b3b6414db,
title = "Demo: Zero touch configuration",
abstract = "The deployment of devices at remote or distributed locations is a typical scenario e.g. in large enterprise networks or industrial applications. In the deployment of a device identification of the device and the establishment of security relations (trust) between the device and other elements of the infrastructure is crucial. Usually, the process requires either to pre-configure the device or to let administrators physically access the device for configuration. Both options induce costs. For functional configurations and software distribution zero configuration solutions are available. One important step hereby is the establishment of trust into the individual device by the device owner. This trust establishment requires in typical schemes a large organizational involvement of the device owner resp. operator. The approach presented in this demo addresses the step of initial trust establishment. The demonstration shows the process of a device being securely configured and provides a visualization through a meta-data graph generated from an IF-MAP server.",
author = "Nicolai Kuntze and Pedro Larbig and Carsten Rudolph",
year = "2013",
language = "English",
isbn = "9783901882517",
pages = "1076--1077",
booktitle = "Proceedings of the 2013 IFIP/IEEE International Symposium on Integrated Network Management, IM 2013",
publisher = "IEEE, Institute of Electrical and Electronics Engineers",
address = "United States of America",

}

Kuntze, N, Larbig, P & Rudolph, C 2013, Demo: Zero touch configuration. in Proceedings of the 2013 IFIP/IEEE International Symposium on Integrated Network Management, IM 2013., 6573136, IEEE, Institute of Electrical and Electronics Engineers, pp. 1076-1077, IFIP/IEEE International Symposium on Integrated Network Management (IM) 2013, Ghent, Belgium, 27/05/13.

Demo : Zero touch configuration. / Kuntze, Nicolai; Larbig, Pedro; Rudolph, Carsten.

Proceedings of the 2013 IFIP/IEEE International Symposium on Integrated Network Management, IM 2013. IEEE, Institute of Electrical and Electronics Engineers, 2013. p. 1076-1077 6573136.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearch

TY - GEN

T1 - Demo

T2 - Zero touch configuration

AU - Kuntze, Nicolai

AU - Larbig, Pedro

AU - Rudolph, Carsten

PY - 2013

Y1 - 2013

N2 - The deployment of devices at remote or distributed locations is a typical scenario e.g. in large enterprise networks or industrial applications. In the deployment of a device identification of the device and the establishment of security relations (trust) between the device and other elements of the infrastructure is crucial. Usually, the process requires either to pre-configure the device or to let administrators physically access the device for configuration. Both options induce costs. For functional configurations and software distribution zero configuration solutions are available. One important step hereby is the establishment of trust into the individual device by the device owner. This trust establishment requires in typical schemes a large organizational involvement of the device owner resp. operator. The approach presented in this demo addresses the step of initial trust establishment. The demonstration shows the process of a device being securely configured and provides a visualization through a meta-data graph generated from an IF-MAP server.

AB - The deployment of devices at remote or distributed locations is a typical scenario e.g. in large enterprise networks or industrial applications. In the deployment of a device identification of the device and the establishment of security relations (trust) between the device and other elements of the infrastructure is crucial. Usually, the process requires either to pre-configure the device or to let administrators physically access the device for configuration. Both options induce costs. For functional configurations and software distribution zero configuration solutions are available. One important step hereby is the establishment of trust into the individual device by the device owner. This trust establishment requires in typical schemes a large organizational involvement of the device owner resp. operator. The approach presented in this demo addresses the step of initial trust establishment. The demonstration shows the process of a device being securely configured and provides a visualization through a meta-data graph generated from an IF-MAP server.

UR - http://www.scopus.com/inward/record.url?scp=84883466740&partnerID=8YFLogxK

M3 - Conference Paper

AN - SCOPUS:84883466740

SN - 9783901882517

SP - 1076

EP - 1077

BT - Proceedings of the 2013 IFIP/IEEE International Symposium on Integrated Network Management, IM 2013

PB - IEEE, Institute of Electrical and Electronics Engineers

ER -

Kuntze N, Larbig P, Rudolph C. Demo: Zero touch configuration. In Proceedings of the 2013 IFIP/IEEE International Symposium on Integrated Network Management, IM 2013. IEEE, Institute of Electrical and Electronics Engineers. 2013. p. 1076-1077. 6573136