Attestation with Constrained Relying Party

Mariam Moustafa, Arto Niemi, Philip Ginzboorg, Jan Erik Ekberg

Research output: Chapter in Book/Report/Conference proceedingConference article in proceedingsScientificpeer-review

10 Downloads (Pure)

Abstract

Allowing a compromised device to e.g., receive privacy-sensitive sensor readings carries significant privacy risks, but to implement the relying party of a contemporary attestation protocol in a computationally constrained sensor is not feasible, and the network reach of a sensor is often limited. In this paper, we present a remote platform attestation protocol suitable for relying parties that are limited to symmetric-key cryptography and a single communication channel. We validate its security with the ProVerif model checker.

Original languageEnglish
Title of host publicationProceedings of the 10th International Conference on Information Systems Security and Privacy
EditorsGabriele Lenzini, Paolo Mori, Steven Furnell
PublisherSciTePress
Pages701-708
Number of pages8
ISBN (Print)9789897586835
DOIs
Publication statusPublished - 2024
MoE publication typeA4 Conference publication
EventInternational Conference on Information Systems Security and Privacy - Rome, Italy
Duration: 26 Feb 202428 Feb 2024
Conference number: 10

Publication series

NameInternational Conference on Information Systems Security and Privacy
Volume1
ISSN (Electronic)2184-4356

Conference

ConferenceInternational Conference on Information Systems Security and Privacy
Abbreviated titleICISSP
Country/TerritoryItaly
CityRome
Period26/02/202428/02/2024

Keywords

  • Device Security
  • Model Checking
  • Remote Attestation

Fingerprint

Dive into the research topics of 'Attestation with Constrained Relying Party'. Together they form a unique fingerprint.

Cite this