Thursday 25th of April 2024
 

Using Cryptography in Trust Computing for Networked Communications


Dang-Quan Nguyen and Louise Lamont

We highlight some major difficulties encountered by current approaches that try to model trust computing in a realistic networked communications system. We characterize these approaches as top-down since they assume that trust is universal and readily quantifiable. Our main concern with these approaches is that their quest to define a universal trust often ends up with a loose, context-dependent definition of trust value. Based on this shortcoming of the top-down approaches, we propose another consideration of trust for networked communications. Namely, we underline the fact that trust is first and foremost a security constraint that exists in each specific network\'s security operation (i.e., attack and defense). Hence, its definition depends on the attack and defense being involved. We call this approach bottom-up and discuss the close relationship between trust and cryptography through some examples of networks attack and defense.

Keywords: Trust computing, Cryptography, Security, Networked communications

Download Full-Text


ABOUT THE AUTHORS

Dang-Quan Nguyen
Dang-Quan Nguyen is a research scientist at the Communications Research Centre, Ottawa, Canada. He has obtained his Master degree in 2003 and his PhD in 2006, both in Computer Science at University of Paris VI (Pierre and Marie Curie), France. He has undergone various research projects at INRIA (France), Orange’s Labs (France) and CRC (Canada) under major government grants and contracts. His research interest includes quality of service in MANETs, trust-based security and cryptography.

Louise Lamont
Louise Lamont is the Research Manager for the Mobile ad hoc and Sensor Networking Group at the Communications Research centre. In this position Louise is responsible for identifying novel research areas for study at CRC and for proposing, implementing and securing funds for new projects in support of major client requirements such as DND. She manages several state-of-the-art laboratories for the conduct of research as well as technical demonstration in the area of mobile ad hoc and sensor networks. She is also responsible for establishing and maintaining liaison, collaboration and partnership with R&D groups at CRC and with external national and international organizations.


IJCSI Published Papers Indexed By:

 

 

 

 
+++
About IJCSI

IJCSI is a refereed open access international journal for scientific papers dealing in all areas of computer science research...

Learn more »
Join Us
FAQs

Read the most frequently asked questions about IJCSI.

Frequently Asked Questions (FAQs) »
Get in touch

Phone: +230 911 5482
Email: info@ijcsi.org

More contact details »