a mechanism for secure and trusted communication between
Post on 05-Apr-2018
215 Views
Preview:
TRANSCRIPT
-
7/31/2019 A Mechanism for Secure and Trusted Communication Between
1/15
A SECURE & TRUSTED MECHANISM
FOR COMMUNICATION BETWEEN
NODES IN MANETS
PRESENTED BY INTERNAL GUIDE
AMIT KUMAR SINGH
DEVENDRA PRATAP SINGH
HEMANGA DUTTA MANOSIJ NANDY
Mrs. SANGEETHA. S
Asst. Professor,
Department Of CSE,MVJ College Of Engineering
-
7/31/2019 A Mechanism for Secure and Trusted Communication Between
2/15
INTRODUCTION The key to the success of real-life applications for mobile
devices is a mechanism assuring secure communicationand proper collaboration among all participant entities.
This security is provided by policy enforcementmechanism. node1
Policyagent
Policyagent Policyagent
node3node2
-
7/31/2019 A Mechanism for Secure and Trusted Communication Between
3/15
SCOPE To ensure fair and secure communication in MANETs,
proper communication policy must be provided.
This project presents the design and implementation of apolicy enforcing mechanism based on trusted executionmonitor built on the TPM.
Before allowing a node to join a network , SATEM verifiesits trustworthiness of enforcing the required policies.
If any policy is violated SATEM disconnects the node.
-
7/31/2019 A Mechanism for Secure and Trusted Communication Between
4/15
OBJECTIVE To build a monitor on Trusted Platform Module(TPM)
which verifies the trustworthiness of enforcing therequired policies.
-
7/31/2019 A Mechanism for Secure and Trusted Communication Between
5/15
PRINCIPLES FOLLOWED: Secure routing: Improve the reliability and robustness of
AODV using Packet Leashes.
Justified sharing: Every mobile node has to serve or relay atleast 1 request from others after posting 3 queries to thenetwork.
Fair game: Each gaming node is free to join any of the nteams. But once it joins one, it can not join another team
without first withdrawing from the current team.
-
7/31/2019 A Mechanism for Secure and Trusted Communication Between
6/15
TRUSTED MULTI-TIER NETWORK
A tier for each purpose and a tier upon tier.
-
7/31/2019 A Mechanism for Secure and Trusted Communication Between
7/15
NODE ARCHITECTURE
-
7/31/2019 A Mechanism for Secure and Trusted Communication Between
8/15
MODULES Satem
Tier Manager
Enforcer
-
7/31/2019 A Mechanism for Secure and Trusted Communication Between
9/15
Satem: The foundation of trust
Components:
Trust agent(satem) is used to control policy managementamong the nodes in the kernel.
Trust evaluator used to control policy management at
application level.
Protocols: System commitment Includes kernel binary and the
modules it may load. Service commitment Includes entire code stack of the
service.
-
7/31/2019 A Mechanism for Secure and Trusted Communication Between
10/15
Tier Manager
The tier manager is an application that allows the node to
create, join and merge into a tier
Protocols: Join: To join an existing application tier.
-
7/31/2019 A Mechanism for Secure and Trusted Communication Between
11/15
Protocol:
Merge: merging two related tiers for flexibility and simplicity.
-
7/31/2019 A Mechanism for Secure and Trusted Communication Between
12/15
EnforcerAn enforcer is any softwarethat can enforce the tier policy. In the simplest form, the tier
application itself has built-in capabilities of enforcing certainpolicies and can be the enforcer.
-
7/31/2019 A Mechanism for Secure and Trusted Communication Between
13/15
CONCLUSION Policy management in ad hoc networks is complex and
tedious.
Using proposed system the policy management ismade reliable and protected.
-
7/31/2019 A Mechanism for Secure and Trusted Communication Between
14/15
REFERENCES Trusted Computing Group, TCG
Specifications.https://www.trustedcomputinggroup.org/home
S. W. Smith and S. H. Weingart, Building a highperformance, programmable secure co-processor.
B. Chen and R. Morris, Certifying program execution
with secure Processors. Microsoft Corp., Next generation secure computingbase,http://www.microsoft.com/resources/ngscb
https://www.trustedcomputinggroup.org/homehttps://www.trustedcomputinggroup.org/homehttp://www/http://www/http://www/http://www/http://www/https://www.trustedcomputinggroup.org/homehttps://www.trustedcomputinggroup.org/homehttps://www.trustedcomputinggroup.org/homehttps://www.trustedcomputinggroup.org/homehttps://www.trustedcomputinggroup.org/homehttps://www.trustedcomputinggroup.org/homehttps://www.trustedcomputinggroup.org/homehttps://www.trustedcomputinggroup.org/homehttps://www.trustedcomputinggroup.org/homehttps://www.trustedcomputinggroup.org/home -
7/31/2019 A Mechanism for Secure and Trusted Communication Between
15/15
THANK YOU
top related