Integrity based relationships and trustworthy communication between network participants

Alexander Oberle, Pedro Larbig, Nicolai Kuntze, Carsten Rudolph

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

3 Citations (Scopus)

Abstract

Establishing trust relationships between network participants by having them prove their operating system's integrity via a Trusted Platform Module (TPM) provides interesting approaches for securing local networks at a higher level. In the introduced approach on OSI layer 2, attacks carried out by already authenticated and participating nodes (insider threats) can be detected and prevented. Forbidden activities and manipulations in hard- and software, such as executing unknown binaries, loading additional kernel modules or even inserting unauthorized USB devices, are detected and result in an autonomous reaction of each network participant. The provided trust establishment and authentication protocol operates independently from upper protocol layers and is optimized for resource constrained machines. Well known concepts of backbone architectures can maintain the chain of trust between different kinds of network types. Each endpoint, forwarding and processing unit monitors the internal network independently and reports misbehaviours autonomously to a central instance in or outside of the trusted network.
Original languageEnglish
Title of host publicationIEEE ICC 2014 - Communication and Information Systems Security Symposium
EditorsAbbas Jamalipour
Place of PublicationPiscataway NJ USA
PublisherIEEE, Institute of Electrical and Electronics Engineers
Pages610-615
Number of pages6
ISBN (Electronic)9781479920037
ISBN (Print)9781479920051
DOIs
Publication statusPublished - 2014
Externally publishedYes
EventIEEE International Conference on Communications 2014 - Sydney, Australia
Duration: 10 Jun 201414 Jun 2014
http://icc2014.ieee-icc.org/
http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=6878057 (IEEE Conference Proceedings)

Conference

ConferenceIEEE International Conference on Communications 2014
Abbreviated titleICC 2014
CountryAustralia
CitySydney
Period10/06/1414/06/14
OtherIEEE International Conference on Communications, ICC 2014, Sydney, Australia.

The ICC is a flagship conference of the IEEE Communications Society and represents one of the largest gatherings of researchers and industry professionals in the field of communications in the world. This year’s conference is no exception and brings together more than 1500 delegates from around the globe to discuss the latest advances in this vibrant and constantly evolving field.
Internet address

Cite this

Oberle, A., Larbig, P., Kuntze, N., & Rudolph, C. (2014). Integrity based relationships and trustworthy communication between network participants. In A. Jamalipour (Ed.), IEEE ICC 2014 - Communication and Information Systems Security Symposium (pp. 610-615). Piscataway NJ USA: IEEE, Institute of Electrical and Electronics Engineers. https://doi.org/10.1109/ICC.2014.6883386
Oberle, Alexander ; Larbig, Pedro ; Kuntze, Nicolai ; Rudolph, Carsten. / Integrity based relationships and trustworthy communication between network participants. IEEE ICC 2014 - Communication and Information Systems Security Symposium. editor / Abbas Jamalipour. Piscataway NJ USA : IEEE, Institute of Electrical and Electronics Engineers, 2014. pp. 610-615
@inproceedings{1a4d7853733c45f280467b6b2792fead,
title = "Integrity based relationships and trustworthy communication between network participants",
abstract = "Establishing trust relationships between network participants by having them prove their operating system's integrity via a Trusted Platform Module (TPM) provides interesting approaches for securing local networks at a higher level. In the introduced approach on OSI layer 2, attacks carried out by already authenticated and participating nodes (insider threats) can be detected and prevented. Forbidden activities and manipulations in hard- and software, such as executing unknown binaries, loading additional kernel modules or even inserting unauthorized USB devices, are detected and result in an autonomous reaction of each network participant. The provided trust establishment and authentication protocol operates independently from upper protocol layers and is optimized for resource constrained machines. Well known concepts of backbone architectures can maintain the chain of trust between different kinds of network types. Each endpoint, forwarding and processing unit monitors the internal network independently and reports misbehaviours autonomously to a central instance in or outside of the trusted network.",
author = "Alexander Oberle and Pedro Larbig and Nicolai Kuntze and Carsten Rudolph",
year = "2014",
doi = "10.1109/ICC.2014.6883386",
language = "English",
isbn = "9781479920051",
pages = "610--615",
editor = "Abbas Jamalipour",
booktitle = "IEEE ICC 2014 - Communication and Information Systems Security Symposium",
publisher = "IEEE, Institute of Electrical and Electronics Engineers",
address = "United States of America",

}

Oberle, A, Larbig, P, Kuntze, N & Rudolph, C 2014, Integrity based relationships and trustworthy communication between network participants. in A Jamalipour (ed.), IEEE ICC 2014 - Communication and Information Systems Security Symposium. IEEE, Institute of Electrical and Electronics Engineers, Piscataway NJ USA, pp. 610-615, IEEE International Conference on Communications 2014, Sydney, Australia, 10/06/14. https://doi.org/10.1109/ICC.2014.6883386

Integrity based relationships and trustworthy communication between network participants. / Oberle, Alexander; Larbig, Pedro; Kuntze, Nicolai; Rudolph, Carsten.

IEEE ICC 2014 - Communication and Information Systems Security Symposium. ed. / Abbas Jamalipour. Piscataway NJ USA : IEEE, Institute of Electrical and Electronics Engineers, 2014. p. 610-615.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

TY - GEN

T1 - Integrity based relationships and trustworthy communication between network participants

AU - Oberle, Alexander

AU - Larbig, Pedro

AU - Kuntze, Nicolai

AU - Rudolph, Carsten

PY - 2014

Y1 - 2014

N2 - Establishing trust relationships between network participants by having them prove their operating system's integrity via a Trusted Platform Module (TPM) provides interesting approaches for securing local networks at a higher level. In the introduced approach on OSI layer 2, attacks carried out by already authenticated and participating nodes (insider threats) can be detected and prevented. Forbidden activities and manipulations in hard- and software, such as executing unknown binaries, loading additional kernel modules or even inserting unauthorized USB devices, are detected and result in an autonomous reaction of each network participant. The provided trust establishment and authentication protocol operates independently from upper protocol layers and is optimized for resource constrained machines. Well known concepts of backbone architectures can maintain the chain of trust between different kinds of network types. Each endpoint, forwarding and processing unit monitors the internal network independently and reports misbehaviours autonomously to a central instance in or outside of the trusted network.

AB - Establishing trust relationships between network participants by having them prove their operating system's integrity via a Trusted Platform Module (TPM) provides interesting approaches for securing local networks at a higher level. In the introduced approach on OSI layer 2, attacks carried out by already authenticated and participating nodes (insider threats) can be detected and prevented. Forbidden activities and manipulations in hard- and software, such as executing unknown binaries, loading additional kernel modules or even inserting unauthorized USB devices, are detected and result in an autonomous reaction of each network participant. The provided trust establishment and authentication protocol operates independently from upper protocol layers and is optimized for resource constrained machines. Well known concepts of backbone architectures can maintain the chain of trust between different kinds of network types. Each endpoint, forwarding and processing unit monitors the internal network independently and reports misbehaviours autonomously to a central instance in or outside of the trusted network.

U2 - 10.1109/ICC.2014.6883386

DO - 10.1109/ICC.2014.6883386

M3 - Conference Paper

SN - 9781479920051

SP - 610

EP - 615

BT - IEEE ICC 2014 - Communication and Information Systems Security Symposium

A2 - Jamalipour, Abbas

PB - IEEE, Institute of Electrical and Electronics Engineers

CY - Piscataway NJ USA

ER -

Oberle A, Larbig P, Kuntze N, Rudolph C. Integrity based relationships and trustworthy communication between network participants. In Jamalipour A, editor, IEEE ICC 2014 - Communication and Information Systems Security Symposium. Piscataway NJ USA: IEEE, Institute of Electrical and Electronics Engineers. 2014. p. 610-615 https://doi.org/10.1109/ICC.2014.6883386