期刊文献+

可信设备接入网络认证协议设计及安全分析 被引量:8

Design and Security Analysis of Authentication Protocol for Trusted Network Access
下载PDF
导出
摘要 伴随着网络技术的快速发展和深度应用,计算量从客户端漂移到互联网中成为当今网络发展的主流方向,由于计算本身由终端向提供服务的外部网络转移,对外提供服务的网络内部安全性变得格外重要。另一方面,军工产业、政府部门、金融等领域相对系统复杂,保密性强,对内部网络安全可靠性有着严格需求。为了保障网络内部的安全可信,落实信息安全等级保护安全建设,针对设备入网安全问题提出了一种基于可信计算的接入认证协议。具体给出了可信设备接入网络的认证方法,利用BAN谓词逻辑证明协议的安全性,确保接入认证过程的安全可信。 With the rapid development and application of network technology,computing from client drift to the Internet become the mainstream in the direction of the development of the network. Because the calculation itself transfers from the terminal to the external network which provides services to,internal network security services become very important foreign. On the other hand,military industry,government departments,finance and other areas are relatively complex and secure,and have strict requirements for the safety and reliability of the internal network.In order to ensure the safety and reliability of the network,we implemented information security level protection and security construction,and proposed a trusted computing based access authentication protocol. The authentication method of the trusted device access network was given,and the BAN predicate logic was used to prove the security of the protocol,so as to ensure the security and reliability of the access authentication process.
作者 林兆鹏 邹起辰 LIN Zhao-peng;ZOU Qi-chen(School of Computer Science & Engineering,Nanjing University of Science & Technology,Nanjing Jiangsu 210094,China;System Design Institute of Mechanical-Electrical Engineering,Beijing 100854,China)
出处 《计算机仿真》 北大核心 2018年第11期254-258,共5页 Computer Simulation
关键词 可信计算 认证协议 安全 Trusted computing Authentication protocol Security
  • 相关文献

参考文献4

二级参考文献132

共引文献344

同被引文献90

引证文献8

二级引证文献22

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部