Establishing Trusted Identities in Disconnected Edge Environments

Sebastian Echeverria, Dan Klinedinst, Keegan Williams, G.A. Lewis

Research output: Chapter in Book / Report / Conference proceedingConference contributionAcademicpeer-review

Abstract

When establishing communication between two nodes, identification, authentication, and authorization provide the information and assurances necessary for the nodes to trust each other. A common solution for establishing trust between two nodes is to create and share credentials in advance, and then use a third-party, online trusted authority to validate the credentials of the nodes. However, the characteristics of tactical environments - such as those in which first responders, search and rescue teams, and military personnel operate - do not consistently provide access to that third-party authority or certificate repository because they are DIL environments (disconnected, intermittent, limited). The goal of this paper is to present a solution for establishing trusted identities in disconnected environments based on secure key generation and exchange in the field. For the implementation and evaluation of the solution we use our open source implementation of a tactical cloudlets system that is targeted at supporting disconnected operations.
Original languageEnglish
Title of host publicationIEEE/ACM Symposium on Edge Computing, SEC 2016, Washington, DC, USA, October 27-28, 2016
PublisherIEEE
Pages51-63
Number of pages13
ISBN (Print)978-1-5090-3322-5
DOIs
Publication statusPublished - 8 Dec 2016

Fingerprint

Dive into the research topics of 'Establishing Trusted Identities in Disconnected Edge Environments'. Together they form a unique fingerprint.

Cite this