期刊文献+

可信网络接入认证协议的设计与分析 被引量:1

Design and analysis of trusted network access authentication protocol
下载PDF
导出
摘要 随着对TNC应用和研究的不断深入,其架构自身的安全性问题也逐渐成为人们所关注的焦点。在分析了TNC架构存在局限性的基础上,提出了一种新的基于TNC规范的网络接入认证协议,在服务器端和客户端安全协商会话密钥的前提下实现了通信双方的双向身份认证和双向平台认证,在提高认证效率的同时使得整个认证过程更为安全可靠。最后,对协议进行了安全性分析,并给出了协议的安全性验证过程,分析结果表明该接入认证协议能够达到预期的安全目标。 With more and more study on TNC,the security issues of the TNC architecture have become the focus.After analyzing the limitations in the TNC architecture,a new network access authentication protocol is proposed,which complies with the TNC specifica-tions.Based on safely negotiated session keys between client and server,the protocol implements both bi-directional identity authentication and bi-directional platform authentication,which makes the whole process more secure while improving authentication efficiency.Finally,a security analysis of the protocol and details of the process of safety authentication are given.The result shows that the protocol meets the expectations of the safety demands.
出处 《计算机工程与设计》 CSCD 北大核心 2011年第12期3993-3996,共4页 Computer Engineering and Design
基金 国家863高技术研究发展计划基金项目(2007AA01Z438200)
关键词 可信网络连接 接入认证协议 双向认证 安全性分析 BAN逻辑 trusted network connect(TNC) access authentication protocol bi-directional authentication security analysis BAN logic
  • 相关文献

参考文献15

  • 1沈昌祥,张焕国,冯登国,曹珍富,黄继武.信息安全综述[J].中国科学(E辑),2007,37(2):129-150. 被引量:354
  • 2TCG trusted network connect TNC architecture for interoperabi- lity version 1.1 [S].http://www.trustedcomputinggroup.org,2006.
  • 3Federated trusted network connect(TNC) versionl.0 [EB/OL].[2010-03-28] .http://www.trustedcomputinggroup.org/files/re- source files/51F4B514-1D09-3519-ADEF8EA701461A74/ TNC Federated_TNC_vl.0-r26.pdf.
  • 4TCG trusted network connect TNC architecture for interoperabi- lity specification version 1.3 [EB/OL]. [2008-09-15] .https:// www.trustedcomputinggroup.org/specs/TNC.
  • 5TCG trusted network connect TNC architecture for interoperabi- lity specification version1.4[EB/OL].http://www, trustedcompu- tinggroup.org/resources/tcg_architecture_overview_version_ 14,2009.
  • 6林闯,彭雪海.可信网络研究[J].计算机学报,2005,28(5):751-758. 被引量:252
  • 7Jaeger T, Sailer R, Shankar U.PRIMA:Policy-reduced integrity measurement architecture [C]. Proceedings of the l lth ACM Symposium on Access Control Models and Technologies.Cali- fomia:ACM Press,2006:19-28.
  • 8Xu Gang, Borcea Cristian, Iftode Liviu.Trusted applicationcen- tric Ad-Hoc networks[C].Pisa, Italy:Proceedings of the MASS 07,2007.
  • 9TCG specification trusted network connect-TNC IF-PEP:proto- col binding for radius revision 0.7 [EB/OL] .https://www.ta'usted- computinggroup.org,2007.
  • 10TCG specification trusted network connect-TNC IF-TNCCS: TLV binding revision 10 [EB/OL] .https://www.trustedcom- putinggroup.org,2008.

二级参考文献49

共引文献649

同被引文献3

引证文献1

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部