Exploiting the Network for Securing Personal Devices
Personal devices (such as smartphones and laptops) often experience incoherent levels of security due to the different protection applications available on the various devices. This paper presents a novel approach that consists in offloading security applications from personal devices and relocating them inside the network; this will be achieved by enriching network devices with the appropriate computational capabilities to execute generic security applications. This approach is fostered by the Secured project, which will define the architecture, data and protocols needed to turn this vision into reality.
KeywordsNetwork-based personal security Personal security protection Remote attestation Network functions virtualization
- 1.Armknecht, F., Gasmi, Y., Sadeghi, A.R., Stewin, P., Unger, M., Ramunno, G., Vernizzi, D.: An efficient implementation of trusted channels based on OpenSSL. In: ACM Workshop on Scalable Trusted Computing, pp. 41–50 (2008)Google Scholar
- 2.Goldman, K., Perez, R., Sailer, R.: Linking remote attestation to secure tunnel endpoints. In: ACM Workshop on Scalable Trusted Computing, pp. 21–24 (2006)Google Scholar
- 4.Trusted Computing Group: TPM Main Specification, Version 1.2, Revision 103 (2007). https://www.trustedcomputinggroup.org
- 6.Network Functions Virtualisation Industry Specification Group (NFV ISG): Network Functions Virtualisation - update white paper, October 2013. http://portal.etsi.org/NFV/NFV_White_Paper2.pdf
- 7.Risso, F., Cerrato, I.: Customizing data-plane processing in edge routers. In: European Workshop on Software Defined Networks, pp. 114–120 (2012)Google Scholar