Attestation with Constrained Relying Party

Mariam Moustafa., Arto Niemi., Philip Ginzboorg., Jan-Erik Ekberg.

Research output: Chapter in Book/Report/Conference proceedingArticle in proceedingsResearchpeer-review

4 Downloads (Pure)

Abstract

Allowing a compromised device to e.g., receive privacy-sensitive sensor readings carries significant privacy risks, but to implement the relying party of a contemporary attestation protocol in a computationally constrained sensor is not feasible, and the network reach of a sensor is often limited. In this paper, we present a remote platform attestation protocol suitable for relying parties that are limited to symmetric-key cryptography and a single communication channel. We validate its security with the ProVerif model checker.
Original languageEnglish
Title of host publicationProceedings of the 10th International Conference on Information Systems Security and Privacy - ICISSP
Volume1
PublisherSCITEPRESS Digital Library
Publication date2024
Pages701-708
ISBN (Electronic)978-989-758-683-5
DOIs
Publication statusPublished - 2024
Event10th International Conference on Information Systems Security and Privacy - Rome, Italy
Duration: 26 Feb 202428 Feb 2024

Conference

Conference10th International Conference on Information Systems Security and Privacy
Country/TerritoryItaly
CityRome
Period26/02/202428/02/2024

Keywords

  • Remote Attestation
  • Device Security
  • Model Checking

Fingerprint

Dive into the research topics of 'Attestation with Constrained Relying Party'. Together they form a unique fingerprint.

Cite this