{"title":"Towards Cooperative Self-Protecting Mobile Devices using Trustful Relationships","authors":"S. Grob","doi":"10.1109/SECCOMW.2006.359542","DOIUrl":null,"url":null,"abstract":"Security remains a major topic in today's networks. Especially in the mobile area there are many security issues that have not yet been satisfactorily addressed, let alone been solved. Most of the security mechanisms and techniques used in wired networks tend to rely upon a fixed network topology. For example, firewalls and intrusion detection systems are placed at central points of a network and configured with a model of the network's structure to control and analyse the data flows transferred for harmful content. If at all, adopting these measures for the mobile world is not easy due to its dynamically changing environments and the mobile device's resource constraints that do not allow demanding analyse tasks. In this paper, we present our work in progress of developing a system architecture for cooperative and self-protecting mobile devices. Our approach is based on the assumption that a mobile network can be protected by securing all participating devices or at least all honest participating devices. Thus, we no longer insist on a global view of the network but on several local views. To make these views as precise as possible and to avoid serious performance bottlenecks on a single device we propose a strategy for coupling trusted mobile devices together into a cooperating group","PeriodicalId":156828,"journal":{"name":"2006 Securecomm and Workshops","volume":"20 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2006-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2006 Securecomm and Workshops","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/SECCOMW.2006.359542","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1
Abstract
Security remains a major topic in today's networks. Especially in the mobile area there are many security issues that have not yet been satisfactorily addressed, let alone been solved. Most of the security mechanisms and techniques used in wired networks tend to rely upon a fixed network topology. For example, firewalls and intrusion detection systems are placed at central points of a network and configured with a model of the network's structure to control and analyse the data flows transferred for harmful content. If at all, adopting these measures for the mobile world is not easy due to its dynamically changing environments and the mobile device's resource constraints that do not allow demanding analyse tasks. In this paper, we present our work in progress of developing a system architecture for cooperative and self-protecting mobile devices. Our approach is based on the assumption that a mobile network can be protected by securing all participating devices or at least all honest participating devices. Thus, we no longer insist on a global view of the network but on several local views. To make these views as precise as possible and to avoid serious performance bottlenecks on a single device we propose a strategy for coupling trusted mobile devices together into a cooperating group