A Mechanism for Secure and Trusted Communication Between

Embed Size (px)

Citation preview

  • 7/31/2019 A Mechanism for Secure and Trusted Communication Between

    1/15

    A SECURE & TRUSTED MECHANISM

    FOR COMMUNICATION BETWEEN

    NODES IN MANETS

    PRESENTED BY INTERNAL GUIDE

    AMIT KUMAR SINGH

    DEVENDRA PRATAP SINGH

    HEMANGA DUTTA MANOSIJ NANDY

    Mrs. SANGEETHA. S

    Asst. Professor,

    Department Of CSE,MVJ College Of Engineering

  • 7/31/2019 A Mechanism for Secure and Trusted Communication Between

    2/15

    INTRODUCTION The key to the success of real-life applications for mobile

    devices is a mechanism assuring secure communicationand proper collaboration among all participant entities.

    This security is provided by policy enforcementmechanism. node1

    Policyagent

    Policyagent Policyagent

    node3node2

  • 7/31/2019 A Mechanism for Secure and Trusted Communication Between

    3/15

    SCOPE To ensure fair and secure communication in MANETs,

    proper communication policy must be provided.

    This project presents the design and implementation of apolicy enforcing mechanism based on trusted executionmonitor built on the TPM.

    Before allowing a node to join a network , SATEM verifiesits trustworthiness of enforcing the required policies.

    If any policy is violated SATEM disconnects the node.

  • 7/31/2019 A Mechanism for Secure and Trusted Communication Between

    4/15

    OBJECTIVE To build a monitor on Trusted Platform Module(TPM)

    which verifies the trustworthiness of enforcing therequired policies.

  • 7/31/2019 A Mechanism for Secure and Trusted Communication Between

    5/15

    PRINCIPLES FOLLOWED: Secure routing: Improve the reliability and robustness of

    AODV using Packet Leashes.

    Justified sharing: Every mobile node has to serve or relay atleast 1 request from others after posting 3 queries to thenetwork.

    Fair game: Each gaming node is free to join any of the nteams. But once it joins one, it can not join another team

    without first withdrawing from the current team.

  • 7/31/2019 A Mechanism for Secure and Trusted Communication Between

    6/15

    TRUSTED MULTI-TIER NETWORK

    A tier for each purpose and a tier upon tier.

  • 7/31/2019 A Mechanism for Secure and Trusted Communication Between

    7/15

    NODE ARCHITECTURE

  • 7/31/2019 A Mechanism for Secure and Trusted Communication Between

    8/15

    MODULES Satem

    Tier Manager

    Enforcer

  • 7/31/2019 A Mechanism for Secure and Trusted Communication Between

    9/15

    Satem: The foundation of trust

    Components:

    Trust agent(satem) is used to control policy managementamong the nodes in the kernel.

    Trust evaluator used to control policy management at

    application level.

    Protocols: System commitment Includes kernel binary and the

    modules it may load. Service commitment Includes entire code stack of the

    service.

  • 7/31/2019 A Mechanism for Secure and Trusted Communication Between

    10/15

    Tier Manager

    The tier manager is an application that allows the node to

    create, join and merge into a tier

    Protocols: Join: To join an existing application tier.

  • 7/31/2019 A Mechanism for Secure and Trusted Communication Between

    11/15

    Protocol:

    Merge: merging two related tiers for flexibility and simplicity.

  • 7/31/2019 A Mechanism for Secure and Trusted Communication Between

    12/15

    EnforcerAn enforcer is any softwarethat can enforce the tier policy. In the simplest form, the tier

    application itself has built-in capabilities of enforcing certainpolicies and can be the enforcer.

  • 7/31/2019 A Mechanism for Secure and Trusted Communication Between

    13/15

    CONCLUSION Policy management in ad hoc networks is complex and

    tedious.

    Using proposed system the policy management ismade reliable and protected.

  • 7/31/2019 A Mechanism for Secure and Trusted Communication Between

    14/15

    REFERENCES Trusted Computing Group, TCG

    Specifications.https://www.trustedcomputinggroup.org/home

    S. W. Smith and S. H. Weingart, Building a highperformance, programmable secure co-processor.

    B. Chen and R. Morris, Certifying program execution

    with secure Processors. Microsoft Corp., Next generation secure computingbase,http://www.microsoft.com/resources/ngscb

    https://www.trustedcomputinggroup.org/homehttps://www.trustedcomputinggroup.org/homehttp://www/http://www/http://www/http://www/http://www/https://www.trustedcomputinggroup.org/homehttps://www.trustedcomputinggroup.org/homehttps://www.trustedcomputinggroup.org/homehttps://www.trustedcomputinggroup.org/homehttps://www.trustedcomputinggroup.org/homehttps://www.trustedcomputinggroup.org/homehttps://www.trustedcomputinggroup.org/homehttps://www.trustedcomputinggroup.org/homehttps://www.trustedcomputinggroup.org/homehttps://www.trustedcomputinggroup.org/home
  • 7/31/2019 A Mechanism for Secure and Trusted Communication Between

    15/15

    THANK YOU