Design and Implementation of Wireless Trusted Access Protocol for Embedded Trusted Endpoints

被引:0
|
作者
Wang Zhenyu [1 ]
Feng Qi [1 ]
Xu Rui [1 ]
Liu Xinjie [1 ]
Li Xiangdong [1 ]
Qi Ning [1 ]
机构
[1] Natl Digital Switching Syst Engn & Technol Res Ct, Zhengzhou, Henan, Peoples R China
关键词
isolation; security policy; Trusted Computing; Trusted Network Connection;
D O I
暂无
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
Trusted Computing technology provides powerful support for the solution to security issues of embedded endpoints in mobile computing environment. When an endpoint connects to the network, the predefined security policy should be checked. Only the one that meets the security policy will be allowed to access to the network. Meanwhile, the one that does not meet the security policy will be isolated. Therefore all the insecure endpoints will be refused to access the network automatically until they satisfy the policy. A lot of wireless network security issues can be solved effectively by making use of trusted endpoints and trusted access technology. In this paper, a solution to construct the hardware and software of embedded trusted endpoints is proposed, and a trusted access mechanism based on the 802.1X and Trusted Network Connection (TNC) technology defined by Trusted Computing Group is discussed, and the design and implementation of a trusted access protocol Is given. Both the trusted access mechanism and the trusted access protocol can be used in wireless networks.
引用
收藏
页码:4769 / 4773
页数:5
相关论文
共 50 条
  • [1] An access authentication protocol for trusted handoff in wireless mesh networks
    Xiao, Peng
    He, Jingsha
    Fu, Yingfang
    [J]. COMPUTER STANDARDS & INTERFACES, 2014, 36 (03) : 480 - 488
  • [2] New access model and implementation of trusted network based on trusted certificate
    Wei, Da
    Jia, Xiang-Peng
    Wang, Jian
    Liu, Yan-Heng
    [J]. Jilin Daxue Xuebao (Gongxueban)/Journal of Jilin University (Engineering and Technology Edition), 2010, 40 (02): : 496 - 500
  • [3] Trusted data access and authorization protocol
    Wenpeng, Song
    Ming, Li
    Baixiang, Liu
    [J]. Journal of China Universities of Posts and Telecommunications, 2021, 28 (05): : 18 - 26
  • [4] Design and analysis on trusted network equipment access authentication protocol
    Lai, Yingxu
    Chen, Yinong
    Zou, Qichen
    Liu, Zenghui
    Yang, Zhen
    [J]. SIMULATION MODELLING PRACTICE AND THEORY, 2015, 51 : 157 - 169
  • [5] Trusted data access and authorization protocol
    Song Wenpeng
    Li Ming
    Liu Baixiang
    [J]. The Journal of China Universities of Posts and Telecommunications, 2021, 28 (05) : 18 - 26
  • [6] ON THE IMPLEMENTATION OF PROTOTYPE SYSTEM FOR WIRELESS NETWORK'S TRUSTED ACCESS ARCHITECTURE
    Cui, Jun
    Zhang, Zhentao
    Yang, Yixian
    Gao, Peng
    [J]. PROCEEDINGS OF 2009 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS TECHNOLOGY AND APPLICATIONS, 2009, : 246 - +
  • [7] Design and Implementation of Mobile Trusted Module for Trusted Mobile Computing
    Kim, Mooseop
    Ju, Hongil
    Kim, Youngsae
    Park, Jiman
    Park, Youngsoo
    [J]. IEEE TRANSACTIONS ON CONSUMER ELECTRONICS, 2010, 56 (01) : 134 - 140
  • [8] Design and Implementation of Mobile Trusted Module for Trusted Mobile Computing
    Kim, Mooseop
    Kim, Youngsae
    Ju, Hongil
    Park, Youngsoo
    [J]. 2010 DIGEST OF TECHNICAL PAPERS INTERNATIONAL CONFERENCE ON CONSUMER ELECTRONICS ICCE, 2010,
  • [9] Implementation Aspects of Mobile and Embedded Trusted Computing
    Dietrich, Kurt
    Winter, Johannes
    [J]. TRUSTED COMPUTING, PROCEEDINGS, 2009, 5471 : 29 - 44
  • [10] A Security Protocol for Trusted Access to Cloud Environment
    Chang, Yanan
    Zhang, Zhiyong
    Wang, Jian
    [J]. RECENT ADVANCES IN ELECTRICAL & ELECTRONIC ENGINEERING, 2015, 8 (02) : 135 - 144