3. Building Chain of Trust

2017 ◽  
pp. 66-99
Keyword(s):  
2020 ◽  
Vol 8 (6) ◽  
pp. 5712-5718

Due to decentralization of Internet of Things(IoT) applications and anything, anytime, anywhere connectivity has increased burden of data processing and decision making at IoT end devices. This overhead initiated new bugs and vulnerabilities thus security threats are emerging and presenting new challenges on these end devices. IoT End Devices rely on Trusted Execution Environments (TEEs) by implementing Root of trust (RoT) as soon as power is on thus forming Chain of trust (CoT) to ensure authenticity, integrity and confidentiality of every bit and byte of Trusted Computing Base (TCB) but due to un-trusted external world connectivity and security flaws such as Spectre and meltdown vulnerabilities present in the TCB of TEE has made CoT unstable and whole TEE are being misutilized. This paper suggests remedial solutions for the threats arising due to bugs and vulnerabilities present in the different components of TCB so as to ensure the stable CoT resulting into robust TEE.


Author(s):  
Ozge Yalciner Ercoskun

Local and organic food is of global importance and benefits our health, community, and environment. Today, people come together and build a food community to access local and organic food directly from the farmers under a chain of trust. It is an amazing opportunity to support small farmers and reach fresh produce. Organic markets, participatory guarantee systems, farm shares or community supported agriculture, work exchange, and other co-operatives allow us to connect with one another and perpetuate social and ecological sustainability. This chapter analyzes these direct organic marketing mechanisms and community building ways towards green economy. It demonstrates these cultures and gives some best practices in the creation of sustainable food community networks around the world. The chapter concludes with emphasizing the significance on the sociality and locality, thus contributing to the long-term goal of sustainable development and resilience.


2021 ◽  
Author(s):  
Prashant Hari Narayan Rajput ◽  
Esha Sarkar ◽  
Dimitrios Tychalas ◽  
Michail Maniatakos

Author(s):  
Thomas Eisenbarth ◽  
Tim Guneysu ◽  
Christof Paar ◽  
Ahmad-Reza Sadeghi ◽  
Marko Wolf ◽  
...  

2016 ◽  
Author(s):  
Hildegard Ferraiolo ◽  
Ramaswamy Chandramouli ◽  
Ketan Mehta ◽  
Jason Mohler ◽  
Stephen Skordinski ◽  
...  

2019 ◽  
Vol 16 (8) ◽  
pp. 3252-3258
Author(s):  
S. Arun Kumar ◽  
M. S. Anbarasi

The cloud based services today offers a large amount of services irrespective of the geographical location to individuals or a group. This opens the way to new security dangers to the protection and also the integrity of the information put away. Public Key Infrastructure mechanism, advanced endorsements, computerized marks are existing techniques to accomplish numerous security prerequisite sites, however late dangers make them powerless against genuine assaults when utilized without earlier trust-point establishments. At the time of open reviewing of the information by Third Party Auditor, it is quite possible that it might trade off in protecting client’s privacy. This outcome in two separate issues which represents the dangers of authentication and additionally the trustworthiness of the information that is being shared. In this paper, we propose a Noble Authentication Protocol with privacy preservation policy cloud that gives solid common verification framework utilizing the Pedersen Commitment scheme alongside using ring signature algorithm calculations that will authenticate the TPA and just give the essential data to checking the trustworthiness of the mutual information with keeping the privacy of the clients covered up. The proposed technique helps in staying away from conceivable hash crashes, approving the chain of trust to certificate authorities and different denial records.


Author(s):  
Israr Khan ◽  
William Farrelly ◽  
Kevin Curran

The authors implement common attacks on a DNS server and demonstrate that DNSSEC is an effective solution to counter DNS security flaws. This research demonstrates how to counter the zone transfer attack via the generation of DNSSEC keys on the name servers which prevent attackers from obtaining a full zone transfer as its request for the transfer without the keys was denied by the primary server. This article also provides a detailed scenario of how DNSSEC can be used as a mechanism to protect against the attack if an attacker tried to perform Cache Poisoning. The authors ultimately show that a DNSSEC server will not accept responses from unauthorised entities and would only accept responses which are authenticated throughout the DNSSEC chain of trust.


2021 ◽  
Vol 2137 (1) ◽  
pp. 012029
Author(s):  
Dazan Qian ◽  
Songhui Guo ◽  
Lei Sun ◽  
Qianfang Hao ◽  
Yunfan Song ◽  
...  

Abstract The deployment of virtual network function (VNF) in the container can realize the 5G service-based architecture (SBA) with high flexibility. The container carrying the VNF has poor isolation and low protection capabilities, and there is a security risk of being tampered and replaced. Current security protection technologies such as access control, intrusion detection, and virus detection cannot ensure that the container is not illegally modified. In order to fundamentally protect the integrity of containerized VNFs, this paper proposes a containerized VNF trust measurement scheme container integrity measurement (CIM). The scheme extends the chain of trust to bare metal containers and virtual machine containers, and experiments are carried out in a containerized VNF communication environment. The results show that the integrity measurement protection scheme is effective. Compared with ordinary containers, the average CPU usage of trusted containers has increased by 26%, and the average memory usage growth rate is less than 1%, the performance overhead caused by CIM is acceptable.


Sign in / Sign up

Export Citation Format

Share Document