About | Contact Us | Register | Login
ProceedingsSeriesJournalsSearchEAI
3rd International ICST Workshop on the Value of Security through Collaboration

Research Article

NetTRUST: mixed NETworks Trust infrastRUcture baSed on Threshold cryptography

Cite
BibTeX Plain Text
  • @INPROCEEDINGS{10.1109/SECCOM.2007.4550299,
        author={Mawloud Omar and Yacine Challal and Abdelmadjid Bouabdallah},
        title={NetTRUST: mixed NETworks Trust infrastRUcture baSed on Threshold cryptography},
        proceedings={3rd International ICST Workshop on the Value of Security through Collaboration},
        publisher={IEEE},
        proceedings_a={SECOVAL},
        year={2008},
        month={6},
        keywords={Mixed Architecture  PKI  Public-Key Certificate Management  Threshold Cryptography  Trust Models},
        doi={10.1109/SECCOM.2007.4550299}
    }
    
  • Mawloud Omar
    Yacine Challal
    Abdelmadjid Bouabdallah
    Year: 2008
    NetTRUST: mixed NETworks Trust infrastRUcture baSed on Threshold cryptography
    SECOVAL
    IEEE
    DOI: 10.1109/SECCOM.2007.4550299
Mawloud Omar1,*, Yacine Challal2,*, Abdelmadjid Bouabdallah2,*
  • 1: ReSyD, Bejaia University, Algeria.
  • 2: Heudiasyc Lab., UTC, France.
*Contact email: mawloud.omar@gmail.com, ychallal@hds.utc.fr, bouabdal@hds.utc.fr

Abstract

The proliferation of network technologies (wired, cellular, ad-hoc, etc.) leads to many different network architectures. These different architectures cohabitate to provide services and contents to end customers. In order to secure services in such mixed networks, it is necessary to rely on a homogeneous trust model. The trust model must define trust relationships between the mixed architecture actors, provide elementary ingredients to secure top level services, and guarantee the security service availability. In this paper, we propose a trust infrastructure for mixed networks architectures. The model uses two particular certification authorities, which ensure X509v3 certificates management: the central certification authorities (CCA) are tied to the portions of the network having a pre-existent communication infrastructure (such as wired networks, cellular networks, etc.), and mobile certification authorities (MCA) which are on the ad-hoc portion of the network. The MCA servers emulate the certification authority role using a (k, n) threshold cryptography scheme, and the CCA servers delegate the role of certification to the MCA servers by using a (t,m) scheme of threshold cryptography. This solution is decentralized and partially distributed, supports the nodes mobility and the failure of, up to n−k, among n MCA servers. The simulation results and the performance evaluation prove the adequacy of this solution to mixed networks architectures.

Keywords
Mixed Architecture PKI Public-Key Certificate Management Threshold Cryptography Trust Models
Published
2008-06-24
Publisher
IEEE
Modified
2011-08-03
http://dx.doi.org/10.1109/SECCOM.2007.4550299
Copyright © 2007–2025 IEEE
EBSCOProQuestDBLPDOAJPortico
EAI Logo

About EAI

  • Who We Are
  • Leadership
  • Research Areas
  • Partners
  • Media Center

Community

  • Membership
  • Conference
  • Recognition
  • Sponsor Us

Publish with EAI

  • Publishing
  • Journals
  • Proceedings
  • Books
  • EUDL