SODA

Trust Evaluation for Embedded Systems Security research challenges identified from an incident network scenario

Gehrmann, Christian and Löfvenberg , Jacob (2011) Trust Evaluation for Embedded Systems Security research challenges identified from an incident network scenario. In: First International Workshop on Dependable and Secure Industrial and Embedded Systems (WORDS 2011), 14 June 2011, Västerås, Sweden.

This is the latest version of this item.

[img]
Preview
PDF (Conference article)
538Kb

Official URL: http://www.mrtc.mdh.se/WORDS2011/index.php?choice=...

Abstract

This paper is about trust establishment and trust evaluations techniques. A short background about trust, trusted computing and security in embedded systems is given. An analysis has been done of an incident network scenario with roaming users and a set of basic security needs has been identified. These needs have been used to derive security requirements for devices and systems, supporting the considered scenario. Using the requirements, a list of major security challenges for future research regarding trust establishment in dynamic networks have been collected and elaboration on some different approaches for future research has been done.This work was supported by the Knowledge foundation and RISE within the ARIES project.

Item Type:Conference or Workshop Item (Paper)
ID Code:5163
Deposited By:Christian Gehrmann
Deposited On:08 Feb 2012 17:04
Last Modified:17 Jan 2013 11:26

Available Versions of this Item

Repository Staff Only: item control page