Protocoles d’Etablissement de Confiance pour Objets Communicants
نویسنده
چکیده
With the advent of self-organizing systems such as ad hoc networks or pervasive computing, security protocols have to meet a new requirement for establishing trust among parties that have no a priori relationship such as a shared naming structure or a common organization. Trust establishment in this context calls for a new paradigm with respect to classical scenarios whereby entities build trust based on some existing security association. This thesis suggests cryptographic protocols through which some party can build trust based on the history of its interactions with other parties. Those protocols allow a party to get a proof of history, i.e. the evidence that it was involved in some interaction with another party. During further interactions, other parties consider the prover trustworthy based on the verification of the history. Privacy is an essential requirement for such a protocol since providing a proof of history to several parties without privacy would severely expose the behavior of the prover. In this work, we propose a dedicated scheme for unlinkable credentials that ensures the anonymity of the prover and the unlinkability of its interactions. This scheme is an extension of group signatures and enables the prover to choose which part of his history is disclosed when submitting a proof. Another approach consists of using evidence of physical location as a means of building trust based on the locality of communicating parties. We define the distance-bounding proof of knowledge scheme that combines a distance measurement technique and a cryptographic mechanism in order to verify the proximity of a party knowing a secret like a private key. This mechanism can be used when delivering a proof of interaction or a location stamp. Last we consider a possible architecture for establishing trust based on history. Our approach combines unlinkable credentials and distance-bounding proofs of knowledge. Thanks to this new scheme, we can show that trust among unknown parties can be built while preserving their privacy. The results of a preliminary implementation are discussed.
منابع مشابه
Constraints-based Verification of Parameterized Cryptographic Protocols
Cryptographic protocols are crucial for securing electronic transactions. The confidence in these protocols can be increased by the formal analysis of their security properties. Although many works have been dedicated to standard protocols like Needham-Schroder very few address the more challenging class of group protocols. We present a synchronous model for group protocols, that generalizes st...
متن کاملInteropérabilité sémantique libérale pour les services et les objets
Résumé. Le Web des données promeut l’utilisation de RDF comme modèle pour les données structurées sur le Web. Cependant, la majorité des services Web consomment et exposent principalement du CSV, JSON, ou XML, des format non-RDF. Il est peu probable que tous ces services se convertissent un jour aux formats RDF existants. Ceci est d’autant plus vrai dans le contexte du Web des objets, puisque l...
متن کاملContribution à la conception d'une plate-forme haute performance d'intégration d'exécutifs communicants pour la programmation des grilles de calcul
ion pour le réparti : ADAPTIVE. ADAPTIVE [164, 165] (connu aussi sous le nom ACE TM — ADAPTIVE Communication Environment —, “ADAPTIVE” étant lui-même l’acronyme de A Dynamically Assembled Protocol Transformation, Integration, and eValuation Environment) est un projet initié par Douglas Schmidt, à l’université de Washington à St. Louis. ADAPTIVE est un environnement de développement portable pou...
متن کاملReplicated Causal Objects Michel Raynal
High performance distributed computing environments must not only support eecient execution of applications but they must also support communication and cooperation among human users that cooperatively work on complex problems. To support eecient access to objects that support cooperation between users, the objects need to be replicated at nodes where they are frequently accessed. Causal consis...
متن کاملRIOT: One OS to Rule Them All in the IoT
The Internet of Things (IoT) embodies a wide spectrum of machines ranging from sensors powered by 8-bits microcontrollers, to devices powered by processors roughly equivalent to those found in entry-level smartphones. Neither traditional operating systems (OS) currently running on internet hosts, nor typical OS for sensor networks are capable to fulfill all at once the diverse requirements of s...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2004