Abstract

Security should be integrated into future networks from the beginning, not as an extension. Secure identities and authentication schemes are an important step to fulfill this quest. In this article, we argue that home networks are a natural trust anchor for such schemes. We describe our concept of home networks as a universal point of reference for authentication, trust and access control, and show that our scheme can be applied to any next generation network. As home networks are no safe place, we apply Trusted Computing technology to prevent the abuse of identities, i.e., identity theft.

Highlights

  • It is still an open question what the network of the future will look like

  • We argue that a user’s home network is a natural point of reference, with properties that are useful in the context of future networks

  • Authentication between other entities of the same home networks benefits from the information that Peer Domain Protocol Authentication (PDP-A) conveys to the users: the other entity is known to belong to a domain to which a high level of assurance exists

Read more

Summary

Introduction

It is still an open question what the network of the future will look like. a plethora of proposals have been submitted and discussed, there is no clear contender for the first prize. Because of the multitude of devices, services and users (all of which are later referred to as entities), these home networks will require secure and flexible mechanisms for authentication and access control. PDP-A allows to carry additional information between the Home CAs and the client entities This can aid in building additional trust between home networks, which is useful in determining access rights in a semi-automated way. Once this has happened, authentication between other entities of the same home networks benefits from the information that PDP-A conveys to the users: the other entity is known to belong to a domain to which a high level of assurance exists. As a man-in-the-middle might have been present during the first contact, it is not advisable to increase access rights much higher without exchanging keys between the domains (out-of-band) at some point

A Trust Anchor for a Home Network’s CA
Discussion
Summary
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call