Trust in M2M communication

作者: Inhyok Cha , Yogendra Shah , Andreas Schmidt , Andreas Leicher , Michael Meyerstein

DOI: 10.1109/MVT.2009.933478

关键词:

摘要: Machine-to-machine (M2M) communication is viewed as one of the next frontiers in wireless communications. M2M applications and scenarios are growing lead way to new business cases. Because nature scenarios, involving unguarded, distributed devices, security threats emerge. The use case for also address requirement on flexibility, because deployment M2ME field. We believe that these requirements require a paradigm shift. One important pillar such shift will be new, more balanced mix device-centric trust traditional enforcement properties.

参考文章(11)
Jan Camenisch, Better Privacy for Trusted Computing Platforms Computer Security – ESORICS 2004. pp. 73- 88 ,(2004) , 10.1007/978-3-540-30108-0_5
Vivek Haldar, Michael Franz, Deepak Chandra, Semantic remote attestation: a virtual machine directed approach to trusted computing VM'04 Proceedings of the 3rd conference on Virtual Machine Research And Technology Symposium - Volume 3. pp. 3- 3 ,(2004)
Andreas Leicher, Nicolai Kuntze, Andreas U. Schmidt, Implementation of a Trusted Ticket System information security conference. ,vol. 297, pp. 152- 163 ,(2009) , 10.1007/978-3-642-01244-0_14
D. Spence, L. Gommans, C. de Laat, G. Gross, J. Vollbrecht, Generic AAA Architecture RFC. ,vol. 2903, pp. 1- 26 ,(2000)
Jan Camenisch, Ernie Brickell, Ernie Brickell, Liqun Chen, Direct anonymous attestation computer and communications security. pp. 132- 145 ,(2004) , 10.1145/1030083.1030103
David Chaum, Security without identification: transaction systems to make big brother obsolete Communications of the ACM. ,vol. 28, pp. 1030- 1044 ,(1985) , 10.1145/4372.4373
Ahmad-Reza Sadeghi, Christian Stüble, Property-based attestation for computing platforms Proceedings of the 2004 workshop on New security paradigms - NSPW '04. pp. 67- 77 ,(2005) , 10.1145/1065907.1066038
Liqun Chen, Rainer Landfermann, Hans Löhr, Markus Rohe, Ahmad-Reza Sadeghi, Christian Stüble, A protocol for property-based attestation Proceedings of the first ACM workshop on Scalable trusted computing - STC '06. pp. 7- 16 ,(2006) , 10.1145/1179474.1179479
Yi Qian, Nader Moayeri, Design of Secure and Application-Oriented VANETs vehicular technology conference. pp. 2794- 2799 ,(2008) , 10.1109/VETECS.2008.610
Andreas U. Schmidt, Andreas Leicher, Inhyok Cha, Scaling Concepts between Trust and Enforcement IGI Global. pp. 20- 57 ,(2010) , 10.4018/978-1-61520-682-7.CH002