Establishing Trusted Identities in Disconnected Edge Environments

Sebastian Echeverria, Dan Klinedinst, Keegan Williams, G.A. Lewis

Research output: Chapter in Book / Report / Conference proceedingConference contributionAcademicpeer-review

Abstract

When establishing communication between two nodes, identification, authentication, and authorization provide the information and assurances necessary for the nodes to trust each other. A common solution for establishing trust between two nodes is to create and share credentials in advance, and then use a third-party, online trusted authority to validate the credentials of the nodes. However, the characteristics of tactical environments - such as those in which first responders, search and rescue teams, and military personnel operate - do not consistently provide access to that third-party authority or certificate repository because they are DIL environments (disconnected, intermittent, limited). The goal of this paper is to present a solution for establishing trusted identities in disconnected environments based on secure key generation and exchange in the field. For the implementation and evaluation of the solution we use our open source implementation of a tactical cloudlets system that is targeted at supporting disconnected operations.
Original languageEnglish
Title of host publicationIEEE/ACM Symposium on Edge Computing, SEC 2016, Washington, DC, USA, October 27-28, 2016
PublisherIEEE
Pages51-63
Number of pages13
ISBN (Print)978-1-5090-3322-5
DOIs
Publication statusPublished - 8 Dec 2016

Fingerprint

Authentication
Personnel
Communication

Cite this

Echeverria, S., Klinedinst, D., Williams, K., & Lewis, G. A. (2016). Establishing Trusted Identities in Disconnected Edge Environments. In IEEE/ACM Symposium on Edge Computing, SEC 2016, Washington, DC, USA, October 27-28, 2016 (pp. 51-63). IEEE. https://doi.org/10.1109/SEC.2016.27
Echeverria, Sebastian ; Klinedinst, Dan ; Williams, Keegan ; Lewis, G.A. / Establishing Trusted Identities in Disconnected Edge Environments. IEEE/ACM Symposium on Edge Computing, SEC 2016, Washington, DC, USA, October 27-28, 2016. IEEE, 2016. pp. 51-63
@inproceedings{911a5252160c4f939f65a66a067710d6,
title = "Establishing Trusted Identities in Disconnected Edge Environments",
abstract = "When establishing communication between two nodes, identification, authentication, and authorization provide the information and assurances necessary for the nodes to trust each other. A common solution for establishing trust between two nodes is to create and share credentials in advance, and then use a third-party, online trusted authority to validate the credentials of the nodes. However, the characteristics of tactical environments - such as those in which first responders, search and rescue teams, and military personnel operate - do not consistently provide access to that third-party authority or certificate repository because they are DIL environments (disconnected, intermittent, limited). The goal of this paper is to present a solution for establishing trusted identities in disconnected environments based on secure key generation and exchange in the field. For the implementation and evaluation of the solution we use our open source implementation of a tactical cloudlets system that is targeted at supporting disconnected operations.",
author = "Sebastian Echeverria and Dan Klinedinst and Keegan Williams and G.A. Lewis",
year = "2016",
month = "12",
day = "8",
doi = "10.1109/SEC.2016.27",
language = "English",
isbn = "978-1-5090-3322-5",
pages = "51--63",
booktitle = "IEEE/ACM Symposium on Edge Computing, SEC 2016, Washington, DC, USA, October 27-28, 2016",
publisher = "IEEE",

}

Echeverria, S, Klinedinst, D, Williams, K & Lewis, GA 2016, Establishing Trusted Identities in Disconnected Edge Environments. in IEEE/ACM Symposium on Edge Computing, SEC 2016, Washington, DC, USA, October 27-28, 2016. IEEE, pp. 51-63. https://doi.org/10.1109/SEC.2016.27

Establishing Trusted Identities in Disconnected Edge Environments. / Echeverria, Sebastian; Klinedinst, Dan; Williams, Keegan; Lewis, G.A.

IEEE/ACM Symposium on Edge Computing, SEC 2016, Washington, DC, USA, October 27-28, 2016. IEEE, 2016. p. 51-63.

Research output: Chapter in Book / Report / Conference proceedingConference contributionAcademicpeer-review

TY - GEN

T1 - Establishing Trusted Identities in Disconnected Edge Environments

AU - Echeverria, Sebastian

AU - Klinedinst, Dan

AU - Williams, Keegan

AU - Lewis, G.A.

PY - 2016/12/8

Y1 - 2016/12/8

N2 - When establishing communication between two nodes, identification, authentication, and authorization provide the information and assurances necessary for the nodes to trust each other. A common solution for establishing trust between two nodes is to create and share credentials in advance, and then use a third-party, online trusted authority to validate the credentials of the nodes. However, the characteristics of tactical environments - such as those in which first responders, search and rescue teams, and military personnel operate - do not consistently provide access to that third-party authority or certificate repository because they are DIL environments (disconnected, intermittent, limited). The goal of this paper is to present a solution for establishing trusted identities in disconnected environments based on secure key generation and exchange in the field. For the implementation and evaluation of the solution we use our open source implementation of a tactical cloudlets system that is targeted at supporting disconnected operations.

AB - When establishing communication between two nodes, identification, authentication, and authorization provide the information and assurances necessary for the nodes to trust each other. A common solution for establishing trust between two nodes is to create and share credentials in advance, and then use a third-party, online trusted authority to validate the credentials of the nodes. However, the characteristics of tactical environments - such as those in which first responders, search and rescue teams, and military personnel operate - do not consistently provide access to that third-party authority or certificate repository because they are DIL environments (disconnected, intermittent, limited). The goal of this paper is to present a solution for establishing trusted identities in disconnected environments based on secure key generation and exchange in the field. For the implementation and evaluation of the solution we use our open source implementation of a tactical cloudlets system that is targeted at supporting disconnected operations.

U2 - 10.1109/SEC.2016.27

DO - 10.1109/SEC.2016.27

M3 - Conference contribution

SN - 978-1-5090-3322-5

SP - 51

EP - 63

BT - IEEE/ACM Symposium on Edge Computing, SEC 2016, Washington, DC, USA, October 27-28, 2016

PB - IEEE

ER -

Echeverria S, Klinedinst D, Williams K, Lewis GA. Establishing Trusted Identities in Disconnected Edge Environments. In IEEE/ACM Symposium on Edge Computing, SEC 2016, Washington, DC, USA, October 27-28, 2016. IEEE. 2016. p. 51-63 https://doi.org/10.1109/SEC.2016.27