2nd International ICST Workshop on the Value of Security through Collaboration

Research Article

Towards Cooperative Self-Protecting Mobile Devices using Trustful Relationships

  • @INPROCEEDINGS{10.1109/SECCOMW.2006.359542,
        author={Stephan  Gro\`{a}},
        title={Towards Cooperative Self-Protecting Mobile Devices using Trustful Relationships},
        proceedings={2nd International ICST Workshop on the Value of Security through Collaboration},
        publisher={IEEE},
        proceedings_a={SECOVAL},
        year={2007},
        month={5},
        keywords={},
        doi={10.1109/SECCOMW.2006.359542}
    }
    
  • Stephan Groß
    Year: 2007
    Towards Cooperative Self-Protecting Mobile Devices using Trustful Relationships
    SECOVAL
    IEEE
    DOI: 10.1109/SECCOMW.2006.359542
Stephan Groß1,*
  • 1: Technische Universität Dresden, Department of Computer Science, Institute for System Architecture, D-01062 Dresden, Germany
*Contact email: Stephan.Gross@tu-dresden.de

Abstract

Security remains a major topic in today's networks. Especially in the mobile area there are many security issues that have not yet been satisfactorily addressed, let alone been solved. Most of the security mechanisms and techniques used in wired networks tend to rely upon a fixed network topology. For example, firewalls and intrusion detection systems are placed at central points of a network and configured with a model of the network's structure to control and analyse the data flows transferred for harmful content. If at all, adopting these measures for the mobile world is not easy due to its dynamically changing environments and the mobile device's resource constraints that do not allow demanding analyse tasks. In this paper, we present our work in progress of developing a system architecture for cooperative and self-protecting mobile devices. Our approach is based on the assumption that a mobile network can be protected by securing all participating devices or at least all honest participating devices. Thus, we no longer insist on a global view of the network but on several local views. To make these views as precise as possible and to avoid serious performance bottlenecks on a single device we propose a strategy for coupling trusted mobile devices together into a cooperating group