Title
Design and analysis on trusted network equipment access authentication protocol.
Abstract
Cloud security is a system engineering problem. A common approach to address the problem is to adapt existing Trusted Network Connection (TNC) framework in the cloud environment, which can be used to assess and verify end clients’ system state. However, TNC cannot be applied to network equipment attached to the cloud computing environment directly. To allow the network devices to access the trusted network devices safely and reliably, we first developed a Trusted Network Equipment Access Authentication Protocol (TNEAAP). We use the BAN logic system to prove that TNEAAP is secure and credible. We then configure the protocol in an attack detection mode to experimentally show that the protocol can withstand attacks in the real network. Experiment results show that all the nine goals that decide the protocol’s security have been achieved.
Year
DOI
Venue
2015
10.1016/j.simpat.2014.10.011
Simulation Modelling Practice and Theory
Keywords
Field
DocType
Trusted network equipment,Authentication,Security protocol,BAN logic,Attack detection model
Wide Mouth Frog protocol,Trusted Network Connect,Tunneling protocol,Computer security,Computer science,Network security,Otway–Rees protocol,Computer network,Authentication protocol,Direct Anonymous Attestation,Network Access Control
Journal
Volume
ISSN
Citations 
51
1569-190X
2
PageRank 
References 
Authors
0.43
12
5
Name
Order
Citations
PageRank
Ying-xu. Lai13713.05
Y. Chen2857.95
Qichen Zou320.43
Zenghui Liu420.43
Zhen Yang5233.88