作者投稿和查稿 主编审稿 专家审稿 编委审稿 远程编辑

计算机工程 ›› 2010, Vol. 36 ›› Issue (12): 146-148. doi: 10.3969/j.issn.1000-3428.2010.12.050

• 安全技术 • 上一篇    下一篇

基于可信计算的Ad hoc网络认证方案

胡荣磊1,李 然2,李兆斌1,方 勇1   

  1. (1. 北京电子科技学院通信工程系,北京 100070;2. 西安电子科技大学计算机学院,西安 710071)
  • 出版日期:2010-06-20 发布日期:2010-06-20
  • 作者简介:胡荣磊(1977-),男,工程师、博士,主研方向:无线网络安全;李 然,硕士研究生;李兆斌,工程师、博士;方 勇,教授、硕士
  • 基金资助:

    国家自然科学基金资助项目(60672102);北京电子科技学院重点实验室基金资助项目(YZDJ0710, YZDJ0805)

Trusted Computing-based Authentication Scheme for Ad hoc Networks

HU Rong-lei1, LI Ran2, LI Zhao-bin1, FANG Yong1   

  1. (1. Department of Communication Engineering, Beijing Electronic Science and Technology Institute, Beijing 100070;2. School of Computer Science and Technology, Xidian University, Xi’an 710071)
  • Online:2010-06-20 Published:2010-06-20

摘要:

针对在Ad hoc网络平台完整性证明方面存在的缺陷,基于可信计算技术提出一种认证方案。节点间通过直接匿名认证协议进行认证,利用平台配置寄存器值和存储测量日志进行平台证明,确认当前平台状态以及完整性,确保通信过程中节点平台的可信,消除了因平台完整性破坏带来的安全隐患,并且满足Ad hoc网络的动态拓扑和自组织特性。

关键词: Ad hoc网络, 可信计算, 直接匿名认证, 平台完整性

Abstract:

According to the defects of the proof of platform integrity in Ad hoc networks, a new authentication scheme is proposed based on trusted computing technology. Nodes authenticate each other through direct anonymous attestation protocol. The contents of platform configuration register and the stored measurement log are used to confirm the current status and integrity of platform which ensures the trust of the platform, and eliminates the security risk brought by damage of platform integrity. This scheme satisfies the dynamic topology and self-organization of Ad hoc networks.

Key words: Ad hoc networks, trusted computing, direct anonymous authentication, platform integrity

中图分类号: