Analysis of existing remote attestation techniques
Article first published online: 7 OCT 2011
Copyright © 2011 John Wiley & Sons, Ltd.
Security and Communication Networks
Volume 5, Issue 9, pages 1062–1082, September 2012
How to Cite
Alam, M., Ali, T., Khan, S., Khan, S., Ali, M., Nauman, M., Hayat, A., Khurram Khan, M. and Alghathbar, K. (2012), Analysis of existing remote attestation techniques. Security Comm. Networks, 5: 1062–1082. doi: 10.1002/sec.393
- Issue published online: 22 AUG 2012
- Article first published online: 7 OCT 2011
- Manuscript Accepted: 4 SEP 2011
- Manuscript Revised: 24 JUL 2011
- Manuscript Received: 25 MAR 2011
- trusted computing;
- remote attestation;
- integrity measurement
This paper has been written as a part of the research project that is working towards the implementation of dynamic behavioral attestation for mobile platforms. The motivation behind this paper was to analyze the existing remote attestation techniques in order to figure out their strengths and weaknesses. We have analyzed Integrity Measurement Architecture, Policy-reduced Integrity Measurement Architecture, Property-based Attestation, Remote Attestation on Program Execution, Semantic Remote Attestation, Trustable Remote Verification of Web Services, and Model-based Behavior Attestation. Each of the existing remote attestation techniques was found to be effective in some situations but was found to be infeasible in others. Therefore, a new remote attestation technique is needed, which is platform independent and flexible enough to meet the challenges of today's scalable computing environments. Copyright © 2011 John Wiley & Sons, Ltd.