Title | ||
---|---|---|
A Trusted Authentication Scheme for Wireless Networks Using Direct Anonymous Attestation |
Abstract | ||
---|---|---|
Not only user identities but also the platforms need to be authenticated in wireless networks under trusted computing environment. Based on direct anonymous attestation of trusted computing, a wireless anonymous authentication scheme is proposed, the platform of the mobile node was verified by the foreign network agent and the identity of the mobile node user was authenticated by the home network agent and the foreign network agent together. By using of direct anonymous attestation, temporary identities and one time secret keys, the property of platform anonymity, identity anonymity and domain separation are achieved. The analysis shows that our scheme is secure, reliable, and with higher performance. |
Year | DOI | Venue |
---|---|---|
2012 | 10.1109/iNCoS.2012.62 | INCoS |
Keywords | Field | DocType |
anonymity,mobile node user,mobile node,identity anonymity,domain separation,foreign network agent,wireless network,trusted computing,trusted authentication scheme,trusted authentication,wireless networks,radio networks,home network agent,authentication,one time secret keys,wireless anonymous authentication scheme,remote attestation,platform anonymity,direct anonymous attestation,trusted computing environment,wireless anonymous authentication,temporary identities,temporary identity,telecommunication security,message authentication | Trusted Network Connect,Wireless network,Authentication,Trusted Computing,Message authentication code,Computer security,Computer science,Computer network,Trusted Platform Module,Direct Anonymous Attestation,Anonymity | Conference |
ISBN | Citations | PageRank |
978-1-4673-2279-9 | 0 | 0.34 |
References | Authors | |
4 | 4 |
Name | Order | Citations | PageRank |
---|---|---|---|
Yang Li | 1 | 145 | 45.40 |
Jianfeng Ma | 2 | 340 | 40.21 |
Zhihong Liu | 3 | 22 | 5.89 |
Ruofan Zheng | 4 | 0 | 0.34 |