期刊文献+

增强的无线TNC证实模型及协议设计 被引量:5

Design of enhanced wireless trusted network accessing attestation model and its protocols
下载PDF
导出
摘要 可信计算技术为解决无线安全问题提供了一个新的思路,无线可信接入是无线网络安全领域的研究热点。目前的可信网络连接(TNC)架构并不能够很好适应无线接入环境。通过分析TNC架构的不足,提出一种增强的无线TNC证实模型并设计模型下的相关协议。通过分析,该模型有较高安全性和效率,具有一定的匿名性,适合于无线接入环境,同时能够兼容不含可信芯片的无线终端接入。 Trusted computing technology brings a new solution to the wireless security problems.Wireless trusted accessing is an important aspect of WLAN security domain.The trusted network connect architecture is not adapted to the wireless accessing environment.By analyzing the deficiencies of TNC architecture,an enhanced wireless TNC attestation model and its protocols are proposed.The model has higher security and efficiency.It also has some anonymity and is adapted to the wireless accessing environment by analysis.At the same time,it also allows the wireless terminal without TPM to access.
出处 《计算机工程与应用》 CSCD 北大核心 2010年第7期121-124,共4页 Computer Engineering and Applications
基金 国家自然科学基金重点项目No.60633020 西安电子科技大学计算机网络与信息安全教育部重点实验室开放课题(No.2007CNIS-06)~~
关键词 可信网络连接 无线接入 证实模型 可信平台模块 Trusted Network Connect(TNC) wireless access attestation model Trusted Platform Module(TPM)
  • 相关文献

参考文献10

  • 1Trusted Computing Group.TPM main specification version 1.2[EB/ OL].(2003-10).https://www.Trustedcomputing group.org/.
  • 2Trusted Computing Group.TCG trusted network connect TNC architecture for interoperability[EB/OL].(2007-05)5).https://www.trustedcomputinggroup.org/.
  • 3Sailer R,Zhang X,.laeger T,et al.Design and implementation of a TCG-based integrity measurement architeeture[C]//The 13th Usenix Security Symposium, 2004.
  • 4Chen Lu,Zhang Huan-guo.A new information measurement scheme based on TPM for trusted network access[M].[S.l.]:IEEE Computer Society Press,2007 : 506-509.
  • 5ZHANG Miao XU Guoai HU Zhengming YANG Yixian.A Trusted Host’s Authentication Access and Control Model Faced on User Action[J].Wuhan University Journal of Natural Sciences,2006,11(6):1429-1432. 被引量:1
  • 6Brickell E, Camenisch J, Chen L.Direct anonymous attestation[C]// Proceedings of 11th ACM Conference on Computer and Communications Security.New York:ACM Press,2004.
  • 7Brickell E,Chen L,Li Jiang-tao.Simplified security notions of direct anonymous attestation and a concrete scheme from Ppairings, Report 2008/104[R].Cryptology ePrint Archive,2008.
  • 8林闯,彭雪海.可信网络研究[J].计算机学报,2005,28(5):751-758. 被引量:253
  • 9Trusted Computing Group.TPM main part 1 design principles version 1.2[EB/OL]. (2007-07).https://www.Trustedcomputinggroup.org/.
  • 10Trusted Computing Group.TCG storage architecture core specification[EB/OL].(2007-07 ).http ://www.trustedcomputinggroup.org.

二级参考文献27

  • 1林闯,任丰原.可控可信可扩展的新一代互联网[J].软件学报,2004,15(12):1815-1821. 被引量:79
  • 2.中国互联网发展状况统计[EB/OL].http://www.cnnic.net.cn,.
  • 3Algridas A., Laprie J.C., Brian R., Carl L.. Basic concepts and taxonomy of dependable and secure computing. IEEE Transactions on Dependable and Secure Computing, 2004, 1(1): 11~33
  • 4Nicol D.M., Sanders W.H., Trivedi K.S.. Model-based evaluation: From dependability to security. IEEE Transactions on Dependable and Secure Computing, 2004, 1(1): 48~65
  • 5Paulson L.D.. Stopping intruders outside the gates. IEEE Computer, 2002, 35(11): 20~22
  • 6International Standards Organization. Information Processing Systems-OSIRM. Part2: Security Architecture, ISO/TC 97 7498-2, 1998
  • 7Vaidya N.H.. A case for two-level recovery schemes. IEEE Transactions on Computers, 1998, 47(6): 656
  • 8Avizienis A.. Design of fault-tolerant computers. In: Proceedings of AFIPS Conference, 1967, 31: 733~743
  • 9Michael Atighetchi, Partha Pal et al.. Adaptive cyberdefense for survival and intrusion tolerance. IEEE Internet Computing, 2004, 8(6): 25~33
  • 10Anderson R.J.. Cryptography and competition policy -issues with trusted computing. In: Proceedings of the PODC'03, Boston, Massachusetts, 2003, 13~16

共引文献252

同被引文献42

  • 1陈燕旋.试论无线校园网的接入安全[J].科技风,2010(2). 被引量:3
  • 2孙玉砚,刘卓华,李强,孙利民.一种面向3G接入的物联网安全架构[J].计算机研究与发展,2010,47(S2):327-332. 被引量:18
  • 3谭彦,厉萍,卢洪涛,邓博存.Wi-Fi无线钓鱼攻击分析及应对技术研究[J].电信科学,2013,29(S2):143-146. 被引量:2
  • 4侯思祖,王明.软交换技术及其在电力系统中的应用[J].继电器,2006,34(15):59-62. 被引量:12
  • 5Balfe S,Lakhani A D,Paterson K G.Trusted computing:Providing security for Peer-to-Peer networks[C]//Proceedings of the Fifth IEEE International Conference on Peer-to-Peer Computing 2005.Washington,DC,USA,2005:117-124.
  • 6Trusted Computing Group,TCG Trusted Network Connect TNC IF-T:Protocol Bindings for Tunneled EAP Methods Specification Version 1.0 Revision 3[S].
  • 7Trusted Computing Group,TCG Trusted Network Connect TNC IF-TNCCS Specification Version 1.1 Revision 1.0[S].
  • 8Trusted Computing Group,TCG Trusted Network Connect TNC Architecture for Interoperabiliity Specification Version 1.4.Revision 4[S].
  • 9Fragouli C,Boudec J Le,Widmer J.Network coding: An instant primer[J].Computer Communication Review,2006,36(1):1-63.
  • 10Bhattad K,Narayanan K R.Weakly secure network coding[C]//Proceeding of NetCod 2005.Rivadel Garda,Italy,2005:281-286.

引证文献5

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部