Abstract
The approach described in this paper is part of the German national research project VOGUE. VOGUE leverages trusted network connect concepts as a key to implement/design a holistic and vendor neutral network access system while addressing shortcomings of traditional network access control mechanisms. The rest of the paper is organized as follows: Section 2 provides the motivation that outlines the importance of validating mobile devices state of health before allowing access to the enterprise network and gives a brief overview of the background on Trusted Network Connect (TNC). Furthermore, the section describes the security risks, challenges and requirements that are relevant to interoperable network access control and authorization. Next, we discuss in section 4 existing solutions and other industry standards and specifications that have had an influence on our work. The paper concludes with section 5.
Chapter PDF
Similar content being viewed by others
Keywords
References
Detken, G., Bartsch, S.: Trusted Network Connect - sicherer Zugang ins Unternehmensnetz; D.A.CH Security 2008: Bestandsaufnahme, Konzepte, Anwendungen und Perspektiven; Herausgeber: Patrick Horster; syssec Verlag; Berlin (2008) ISBN 978-3-00-024632-6
TCG, Trusted Network Connect Architecture for Interoperability, Specification 1.3, Revision 6 (April 2008)
Nispel, M.: Enterasys Secure Networks: Was Sie über NAC wissen sollten, http://www.computerwoche.de/knowledge_center/security/1871427/index.html
Eren, E., Detken, K.-O.: Mobile Security - Risiken mobiler Kommunikation und Lösungen zur mobilen Sicherheit. Carl Hanser Verlag, München Wien (2006) ISBN 3-446-40458-9
Eren, E., Detken, K.-O.: Identity and Access Management according to the implementation of the SIMOIT project and TNC@FHH. International Journal of Computing, Ukraine (2010) ISSN 1727-6209
http://www.infowan.de/index.html?windows_2008_profvogl2.html
Cisco NAC Appliance - Clean Access Manager Installation and Configuration Guide, Release 4.1(2)
TCG, TCG Specication Architecture Overview v1.2. Technical report, Trusted Computing Group, pp. 11–12 (April 2004)
TCG Mobile Phone Work Group, Mobile Trusted Module Overview Document (2006)
Strasser, M., Stamer, H., Molina, J.: Software-based TPM Emulator, http://tpm-emulator.berlios.de
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2010 IFIP
About this paper
Cite this paper
Detken, KO., Fhom, H.S., Sethmann, R., Diederich, G. (2010). Leveraging Trusted Network Connect for Secure Connection of Mobile Devices to Corporate Networks. In: Pont, A., Pujolle, G., Raghavan, S.V. (eds) Communications: Wireless in Developing Countries and Networks of the Future. WCITD NF 2010 2010. IFIP Advances in Information and Communication Technology, vol 327. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-15476-8_16
Download citation
DOI: https://doi.org/10.1007/978-3-642-15476-8_16
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-15475-1
Online ISBN: 978-3-642-15476-8
eBook Packages: Computer ScienceComputer Science (R0)