Trusted Network Access Authentication Scheme Based on the Label

被引:0
|
作者
Wang, Yu [1 ]
Duan, Yu [1 ]
Wang, Fei [1 ]
机构
[1] Acad Equipment, Dept Informat Equipment, Beijing, Peoples R China
关键词
Trusted network; USBKey; Label; Access authentication;
D O I
10.1007/978-81-322-1759-6_15
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Trusted network is a new direction of Internet research. On the basis of trusted network, this paper puts forward a trusted terminal that takes the USBKey as a trusted root and designed a trusted label that used to access authentication. Then, against the background of the trusted local area network (LAN), this paper describes the initial access authentication process and the sustainable authentication process when the trusted terminal access the trusted LAN, meanwhile, analyzes its safety performance.
引用
收藏
页码:123 / 130
页数:8
相关论文
共 50 条
  • [1] Identity authentication scheme in trusted network
    Zhuang, Jun-Xi
    Gong, Bei
    Zhang, Xing
    [J]. Beijing Gongye Daxue Xuebao/Journal of Beijing University of Technology, 2010, 36 (SUPPL. 2): : 27 - 29
  • [2] The Design of Trusted Access Scheme Based On Identity For WiMAX Network
    Liu, Ergang
    Huang, Kaizhi
    Jin, Liang
    [J]. PROCEEDINGS OF THE FIRST INTERNATIONAL WORKSHOP ON EDUCATION TECHNOLOGY AND COMPUTER SCIENCE, VOL III, 2009, : 429 - 433
  • [3] A new information measurement scheme based on TPM for trusted network access
    Chen, Lu
    Zhang, Huanguo
    Zhang, Liqiang
    Cai, Liang
    [J]. CIS WORKSHOPS 2007: INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY WORKSHOPS, 2007, : 506 - +
  • [4] Access Authentication Mechanism for Trusted Network Implement on Mobile Terminals
    Wu, Hao
    Zhong, Zhang-dui
    [J]. JOURNAL OF INTERNET TECHNOLOGY, 2008, 9 (05): : 425 - 428
  • [5] Design and analysis on trusted network equipment access authentication protocol
    Lai, Yingxu
    Chen, Yinong
    Zou, Qichen
    Liu, Zenghui
    Yang, Zhen
    [J]. SIMULATION MODELLING PRACTICE AND THEORY, 2015, 51 : 157 - 169
  • [6] Trusted Access in Wireless Network on Mutual Interactive Authentication Mechanism
    Zhu, Dali
    Pang, Na
    Fan, Zheming
    Ou, Changhai
    [J]. PROCEEDINGS OF THE 2015 10TH INTERNATIONAL CONFERENCE ON COMMUNICATIONS AND NETWORKING IN CHINA CHINACOM 2015, 2015, : 776 - 781
  • [7] Trusted Computing Based Mobile DRM Authentication Scheme
    Yang, Zhen
    Fan, Kefeng
    Lai, Yingxu
    [J]. FIFTH INTERNATIONAL CONFERENCE ON INFORMATION ASSURANCE AND SECURITY, VOL 1, PROCEEDINGS, 2009, : 7 - +
  • [8] Novel access and remediation scheme in hierarchical trusted network
    Wang, Jian
    Liu, Yanheng
    Jiao, Yu
    [J]. COMPUTER COMMUNICATIONS, 2011, 34 (03) : 375 - 383
  • [9] An IKEv2-Based Hybrid Authentication Scheme for Simultaneous Access Network and Home Network Authentication
    Ko, MyeongJi
    Kim, Hyogon
    Min, Sung-Gi
    [J]. IEICE TRANSACTIONS ON COMMUNICATIONS, 2022, E105B (02) : 250 - 258
  • [10] An Identity-based Access Authentication Scheme for Heterogeneous Wireless Network
    Hou Huifang
    Wang Yuhua
    Wang Yunxia
    Liu Guangqiang
    [J]. 2009 5TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-8, 2009, : 231 - 234