{"title":"在异构网络中建立信任","authors":"Dominik Schürmann","doi":"10.1109/PERCOMW.2017.7917540","DOIUrl":null,"url":null,"abstract":"Many scenarios require confidential communication and protection against active attackers. The way to establish trust between devices and authenticate these networks depends completely on the scenario. In Body Area Networks human biometrics can serve as a shared secret among devices. In real-time voice communication, the ZRTP protocol allows for interactive trust establishment by recognizing the peer's voice. In asynchronous networks, such as email, other interactive mechanisms have been deployed, such as key fingerprint verification. In our research, we are analyzing the security and usability of existing trust mechanisms for heterogeneous networks. Furthermore, we are proposing protocol changes and new mechanisms to establish trust between devices. In this paper an overview is given over existing and upcoming research in this area. For synchronous networks, human biometrics, such as human gait or a peer's voice, are used as trust anchors. For asynchronous networks, the usability of interactive public-key verification mechanism are analyzed as trust anchors.","PeriodicalId":319638,"journal":{"name":"2017 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops)","volume":"42 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2017-03-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Establishing trust in heterogeneous networks\",\"authors\":\"Dominik Schürmann\",\"doi\":\"10.1109/PERCOMW.2017.7917540\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Many scenarios require confidential communication and protection against active attackers. The way to establish trust between devices and authenticate these networks depends completely on the scenario. In Body Area Networks human biometrics can serve as a shared secret among devices. In real-time voice communication, the ZRTP protocol allows for interactive trust establishment by recognizing the peer's voice. In asynchronous networks, such as email, other interactive mechanisms have been deployed, such as key fingerprint verification. In our research, we are analyzing the security and usability of existing trust mechanisms for heterogeneous networks. Furthermore, we are proposing protocol changes and new mechanisms to establish trust between devices. In this paper an overview is given over existing and upcoming research in this area. For synchronous networks, human biometrics, such as human gait or a peer's voice, are used as trust anchors. For asynchronous networks, the usability of interactive public-key verification mechanism are analyzed as trust anchors.\",\"PeriodicalId\":319638,\"journal\":{\"name\":\"2017 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops)\",\"volume\":\"42 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2017-03-13\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2017 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/PERCOMW.2017.7917540\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2017 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/PERCOMW.2017.7917540","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Many scenarios require confidential communication and protection against active attackers. The way to establish trust between devices and authenticate these networks depends completely on the scenario. In Body Area Networks human biometrics can serve as a shared secret among devices. In real-time voice communication, the ZRTP protocol allows for interactive trust establishment by recognizing the peer's voice. In asynchronous networks, such as email, other interactive mechanisms have been deployed, such as key fingerprint verification. In our research, we are analyzing the security and usability of existing trust mechanisms for heterogeneous networks. Furthermore, we are proposing protocol changes and new mechanisms to establish trust between devices. In this paper an overview is given over existing and upcoming research in this area. For synchronous networks, human biometrics, such as human gait or a peer's voice, are used as trust anchors. For asynchronous networks, the usability of interactive public-key verification mechanism are analyzed as trust anchors.