期刊文献+

基于可信计算的无线网络终端认证机制研究 被引量:1

The Identity Authentication Mechanism of Wireless Network Terminal Based on Trusted Computing
下载PDF
导出
摘要 针对计算机可信计算设计理念中存在的WSN终端数据安全问题,提出了一种基于可信计算的无线传感器网络终端身份认证机制。通过引入可信平台模块(TMP),结合生物识别技术的思想,实现用户与TMP之间的相互认证。由TPM直接控制指纹模板和生物校验软件,减少了数据传输过程中可能发生的潜在威胁,提高了无线传感器网络终端的可靠性。分析认为,该方案对可信计算在终端安全方面的研究有着重要的参考价值。 A new type of identity authentication mechanism of wireless network terminal based on trusted computing is developed.Combine with the idea of biometric technology,the Trusted Platform Module(TPM)is introduced to achieve mutual authentication between the user and the TMP.The fingerprint template and biological validation software have been controlled by TMP,which can diminish the Possibility of potential threat during the data transmission and improve the reliability of wireless sensor network terminal.Analysis shows that this program has important reference value in the terminal trusted computing security research.
作者 李飞
出处 《科学技术与工程》 2011年第32期8069-8072,共4页 Science Technology and Engineering
关键词 可信计算 无线传感网络 身份认证 trusted computing Wireless Sensor Network(WSN) identity authentication
  • 相关文献

参考文献10

  • 1杨凤,史浩山,朱灵波.一种基于可信计算的WSN认证机制[J].计算机仿真,2008,25(10):119-124. 被引量:3
  • 2朱政坚,谭庆平,朱培栋.无线传感器网络安全研究综述[J].计算机工程与科学,2008,30(4):101-105. 被引量:22
  • 3王飞,刘毅.可信计算平台安全体系及应用研究[J].微计算机信息,2007(03X):76-78. 被引量:18
  • 4TCG.Trusted Computing Group(TCG)Main Specification version 1.1a. http://www.trustedcom putinggroup.org/downloads/tcg spec1.1b.zip . 2001
  • 5TPM Main Part 2:TPM Structures,Specification Version 1.2. . 2006
  • 6Trusted Mobile Platform Hardware Architecture Description. http://www.trustedmobile.org/TMP_HWAD_rev1_00.pdf . 2007
  • 7Trusted Mobile Platform Software Architecture Description. http://www.trustedmobile.org/TMP_SWAD_rev1_00.pdf . 2007
  • 8Trusted Mobile Platform Protocol Specification Document. http://www.trustedmobile.org/TMP_Protocol_rev1_00.pdf . 2007
  • 9Trusted Computing Group.Trusted computing platform alliance(TCG)main specification,version 1.1a.Republished as Trusted Computing Group(TCG)main specifcation,Version 1.1b. www.trusted computing group.org . 2002
  • 10TCG.TPM Main Part 1 Design Principles Specification Version 1.2 Level 2 Revision 103. https://www.trustedcomputinggroup.org/ . 2007

二级参考文献52

  • 1王飞,刘毅.可信计算平台管理中心的设计与实现[J].微计算机信息,2007,23(3):91-93. 被引量:8
  • 2TCG.Trusted Computing Group (TCG) Main Specification version 1.1a[EB/OL].http://www.trustedcomputinggroup.org/downloads/tcg spec 1.1b.zip,2001-09.
  • 3Trusted Computing Group.TPM Main Specification:Design Principles v1.2[EB/OL].https://www.trustedcomputinggroup.org.Oct 2003.
  • 4Chen You-lei,Shen Chang-xiang.A Security Kernel Architecture Based Trusted Computing Platform[J].Wuhan University Journal of National Sciences.Vol.10,No.1,pages 1-4,Jan 2005.
  • 5Traynor P, Choi H, Cao G, et al. Establishing Pair-Wise Keys in Heterogeneous Sensor Networks[C]//Proc of IEEE INFOCOM'06,2006.
  • 6Estrin D, Govindan R, Estin D, et al. Directed Diffusion for Wireless Sensor Networking[J]. IEEE/ACM Trans on Networks, 2003,11 (1) :2-16.
  • 7Estrin D, Ramesh G, Deborah E. Geographical and Energy-Aware Routing:A Recursive Data Dissemination Protocol for Wireless Sensor Networks[R]. Technical Report UCLACSD TR-01-0023, Department of Computer Science, UCLA, 2001.
  • 8Yu Y,Govindan R, Estrin D.Geographical and Energy Aware Routing: A Recursive Data Dissemination Protocol for Wireless Sensor Networks[R]. Technical Report UCLA/ CSD-TR-01-0023, Department of Computer Science, UCLA, 2001.
  • 9Ganesan D, Govindan R, Shenker S, et al. Highly-Resilient, Energy-Efficient Multipath Routing in Wireless Sensor Networks[J]. ACM SIGMOBILE Mobile Computing and Communications Review, 2002,5 (4):11-25.
  • 10Deng J, Han R, Mishra S. INSENS: Intrusion-Tolerant Routing in Wireless Sensor Networks[R]. Technical Report CUCS-939-02, Department of Computer Science, University of Colorado, 2002.

共引文献38

同被引文献8

引证文献1

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部