Analysis of existing remote attestation techniques

  • Authors:
  • Masoom Alam;Tamleek Ali;Sanaullah Khan;Shahbaz Khan;Muhammad Ali;Mohammad Nauman;Amir Hayat;Muhammad Khurram Khan;Khaled Alghathbar

  • Affiliations:
  • Security Engineering Research Group, Institute of Management Sciences Peshawar, Peshawar, Pakistan;Security Engineering Research Group, Institute of Management Sciences Peshawar, Peshawar, Pakistan;Security Engineering Research Group, Institute of Management Sciences Peshawar, Peshawar, Pakistan;Security Engineering Research Group, Institute of Management Sciences Peshawar, Peshawar, Pakistan;Security Engineering Research Group, Institute of Management Sciences Peshawar, Peshawar, Pakistan;Security Engineering Research Group, Institute of Management Sciences Peshawar, Peshawar, Pakistan;School of Electrical Engineering and Computer Science, NUST, Islamabad, Pakistan;Center of Excellence in Information Assurance, King Saud University, Riyadh, Saudi Arabia;Center of Excellence in Information Assurance, King Saud University, Riyadh, Saudi Arabia

  • Venue:
  • Security and Communication Networks
  • Year:
  • 2012

Quantified Score

Hi-index 0.00

Visualization

Abstract

This paper has been written as a part of the research project that is working towards the implementation of dynamic behavioral attestation for mobile platforms. The motivation behind this paper was to analyze the existing remote attestation techniques in order to figure out their strengths and weaknesses. We have analyzed Integrity Measurement Architecture, Policy-reduced Integrity Measurement Architecture, Property-based Attestation, Remote Attestation on Program Execution, Semantic Remote Attestation, Trustable Remote Verification of Web Services, and Model-based Behavior Attestation. Each of the existing remote attestation techniques was found to be effective in some situations but was found to be infeasible in others. Therefore, a new remote attestation technique is needed, which is platform independent and flexible enough to meet the challenges of today's scalable computing environments. Copyright © 2011 John Wiley & Sons, Ltd.