首页> 外文期刊>Computer networks >Smart dust, friend or foe?—Replacing identity with configuration trust
【24h】

Smart dust, friend or foe?—Replacing identity with configuration trust

机译:尘土飞扬,是敌是友?—用配置信任替换身份

获取原文
获取原文并翻译 | 示例
           

摘要

Smart dust motes are miniature self-contained systems that may be deployed in very large numbers. In military applications these devices are subject to different threats than conventionally deployed systems, for example, attackers may deploy counterfeit devices to subvert the integrity of a system, and this may be a greater concern that confidentiality. The possibility of identity theft reduces the value of conventional authentication methods, prompting a re-evaluation of how to achieve integrity in such systems. This paper reviews the authentication problem from first principles, but instead of regarding each pairwise network interaction separately, it shows how to build Configuration Trust in a system as a whole. The new trust process focuses on establishing the type or function of a device, rather than individual identity, supported by key distribution that introduces just sufficient diversity to detect subverted motes. This is embodied in protocols that establish communication with a mote and manage the system configuration. These protocols are shown to be effective in defeating standard communication attacks, and a detailed analysis demonstrates their strength in the face of an attack by overwhelming numbers of counterfeit motes. The paper concludes by illustrating the use of this trust mechanism in a simulated dust war. The simulation results confirm that this Configuration Trust system is robust, even under aggressive attack.
机译:智能除尘器是微型的独立系统,可以大量部署。在军事应用中,这些设备与常规部署的系统相比受到的威胁不同,例如,攻击者可能会部署伪造的设备来破坏系统的完整性,因此,对于机密性的关注可能更大。身份盗用的可能性降低了常规身份验证方法的价值,从而促使人们重新评估如何在此类系统中实现完整性。本文从第一条原则回顾了身份验证问题,但是它没有显示每个成对的网络交互,而是显示了如何在整个系统中构建配置信任。新的信任过程着重于建立设备的类型或功能,而不是建立个人身份,而由密钥分发支持,该密钥分发仅引入足够的多样性来检测颠覆的微粒。这体现在与节点建立通信并管理系统配置的协议中。这些协议被证明在克服标准通信攻击方面是有效的,并且经过大量分析,证明了它们在面对攻击时的实力,数量众多。本文最后通过说明这种信任机制在模拟沙尘暴中的使用来结束。仿真结果证实,即使在攻击性攻击下,此Configuration Trust系统也很强大。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号