Combining History-based Trust Establishment with Distance-bounding Protocols

نویسندگان

  • Laurent Bussard
  • Refik Molva
  • Yves Roudier
چکیده

History-based trust establishment aims at using unlinkable recommendations and proofs of context in order to build trust based on human notions of trust: when two persons meet for the first time, they exchange information on their acquaintances, interest and context in order to find some shared experience on which to build trust. This paper focuses on two central aspects of trust establishment: the history-based trust establishment mechanism and the proof of locality viewed as an important contextual attribute. We suggest a mechanism for proof of locality based on a distance bounding protocol. The resulting proof of locality as well as other attributes can then anonymously be combined with our history-based scheme in order for each party to prove his attributes without revealing his identity. The trust establishment scheme relies on an extension of group signatures and thus inherits various privacy attributes thereof.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Protocoles d’Etablissement de Confiance pour Objets Communicants

With the advent of self-organizing systems such as ad hoc networks or pervasive computing, security protocols have to meet a new requirement for establishing trust among parties that have no a priori relationship such as a shared naming structure or a common organization. Trust establishment in this context calls for a new paradigm with respect to classical scenarios whereby entities build trus...

متن کامل

Design and Analysis of Lightweight Trust Mechanism for Secret Data using Lightweight Cryptographic Primitives in MANETs

Lightweight trust mechanism with lightweight cryptography primitives and post-quantum cryptosystems are having important concerns in resource constraint wireless sensor based Mobile Ad Hoc Networks (MANETs). In postquantum cryptosystems, error correcting codes (ECC) help in code based cryptography for lightweight identification, authentication, distance bounding and tag with ownership transfer ...

متن کامل

Range Authentication Protocols for Localization

A distance bounding protocol is a type of challenge-response protocol used to measure the distance of a responder (or prover) from an initiator (or verifier). The advantage of the protocol is that, assuming that the prover does not collude with anybody else, he cannot make himself appear any closer than he is. If he colludes with somebody else, he can only appear as close as his cohort. Distanc...

متن کامل

Establishing Trust with Privacy

With the advent of self-organizing systems such as ad hoc networks or ubiquitous computing, security protocols have to meet a new requirement for establishing trust among parties that have no a priori relationship like a shared naming structure or a common organization. Trust establishment in this context calls for a brand new paradigm with respect to classical scenarios whereby entities build ...

متن کامل

Automatic analysis of distance bounding protocols

Distance bounding protocols are used by nodes in wireless networks for the crucial purpose of estimating their distances to other nodes. This typically involves sending a request by one node to another node, receiving a response, and then calculating an upper bound on the distance by multiplying the round-trip time with the velocity of the signal. However, dishonest nodes in the network can tur...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2004