Trusted Network Access Authentication Scheme Based on the Label

被引:0
|
作者
Wang, Yu [1 ]
Duan, Yu [1 ]
Wang, Fei [1 ]
机构
[1] Acad Equipment, Dept Informat Equipment, Beijing, Peoples R China
关键词
Trusted network; USBKey; Label; Access authentication;
D O I
10.1007/978-81-322-1759-6_15
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Trusted network is a new direction of Internet research. On the basis of trusted network, this paper puts forward a trusted terminal that takes the USBKey as a trusted root and designed a trusted label that used to access authentication. Then, against the background of the trusted local area network (LAN), this paper describes the initial access authentication process and the sustainable authentication process when the trusted terminal access the trusted LAN, meanwhile, analyzes its safety performance.
引用
收藏
页码:123 / 130
页数:8
相关论文
共 50 条
  • [41] A chip -based quantum access network without trusted relays
    Xu, Feihu
    [J]. 2023 OPTICAL FIBER COMMUNICATIONS CONFERENCE AND EXHIBITION, OFC, 2023,
  • [42] An authentication scheme for XOR network coding based on network lifetime
    Jiang, Guosheng
    Qin, Tuanfa
    Tang, Zhenhua
    Sun, Guanghao
    [J]. INDUSTRIAL INSTRUMENTATION AND CONTROL SYSTEMS, PTS 1-4, 2013, 241-244 : 2395 - 2401
  • [43] A trusted authentication scheme based on super SIM card for mobile office for industry 4.0
    Kong, Lingnan
    Qian, Zhendong
    Xu, Lvbin
    Yang, Jun
    Shao, Quanyuan
    [J]. NEURAL COMPUTING & APPLICATIONS, 2023, 35 (29): : 21525 - 21533
  • [44] A Secure Distributed Authentication Scheme Based on CRT-VSS and Trusted Computing in MANET
    Wang Xingfu
    Lu Qiwei
    Xiong Yan
    Miao Fuyou
    Huang Wenchao
    Liu Tao
    Wu Xuangou
    [J]. CHINESE JOURNAL OF ELECTRONICS, 2014, 23 (02) : 284 - 290
  • [45] A Secure Distributed Authentication Scheme Based on CRT-VSS and Trusted Computing in MANET
    WANG Xingfu
    LU Qiwei
    XIONG Yan
    MIAO Fuyou
    HUANG Wenchao
    LIU Tao
    WU Xuangou
    [J]. Chinese Journal of Electronics, 2014, 23 (02) : 284 - 290
  • [46] A trusted authentication scheme based on super SIM card for mobile office for industry 4.0
    Lingnan Kong
    Zhendong Qian
    Lvbin Xu
    Jun Yang
    Quanyuan Shao
    [J]. Neural Computing and Applications, 2023, 35 : 21525 - 21533
  • [47] A Sink Node Trusted Access Authentication Protocol for Mobile Wireless Sensor Network Using Block Cipher Algorithm Based on IoT
    Wang, Qian
    Chen, Wenxia
    Wang, Lei
    [J]. INTERNATIONAL JOURNAL OF WIRELESS INFORMATION NETWORKS, 2020, 27 (02) : 234 - 240
  • [48] A Sink Node Trusted Access Authentication Protocol for Mobile Wireless Sensor Network Using Block Cipher Algorithm Based on IoT
    Qian Wang
    Wenxia Chen
    Lei Wang
    [J]. International Journal of Wireless Information Networks, 2020, 27 : 234 - 240
  • [49] Blockchain based authentication and access verfication scheme in smart home
    Heshmati A.
    Bayat M.
    Doostari M.A.
    Pournaghi S.M.
    [J]. Journal of Ambient Intelligence and Humanized Computing, 2023, 14 (03) : 2525 - 2547
  • [50] The connection anonymous scheme of trusted network
    Zhuang, Jun-Xi
    Gong, Bei
    [J]. Beijing Gongye Daxue Xuebao/Journal of Beijing University of Technology, 2010, 36 (05): : 597 - 600