【24h】

Design and Implementation of Wireless Trusted Access Protocol for Embedded Trusted Endpoints

机译:嵌入式可信端点的无线可信访问协议的设计与实现

获取原文

摘要

Trusted Computing technology provides powerful support for the solution to security issues of embedded endpoints in mobile computing environment. When an endpoint connects to the network, the predefined security policy should be checked. Only the one that meets the security policy will be allowed to access to the network. Meanwhile, the one that does not meet the security policy will be isolated. Therefore all the insecure endpoints will be refused to access the network automatically until they satisfy the policy. A lot of wireless network security issues can be solved effectively by making use of trusted endpoints and trusted access technology. In this paper, a solution to construct the hardware and software of embedded trusted endpoints is proposed, and a trusted access mechanism based on the 802.1X and Trusted Network Connection (TNC) technology defined by Trusted Computing Group is discussed, and the design and implementation of a trusted access protocol is given. Both the trusted access mechanism and the trusted access protocol can be used in wireless networks.
机译:可信计算技术为移动计算环境中嵌入式端点的安全问题解决方案提供了强大的支持。当端点连接到网络时,应检查预定义的安全策略。只有符合安全策略的服务器才能被允许访问网络。同时,不符合安全策略的将被隔离。因此,所有不安全的端点将被拒绝自动访问网络,直到它们满足策略。通过使用受信任的端点和受信任的访问技术,可以有效解决许多无线网络安全问题。本文提出了一种构建嵌入式可信端点的硬件和软件的解决方案,并讨论了基于802.1X和Trusted Computing Group定义的Trusted Network Connection(TNC)技术的可信访问机制,并设计和实现给出了可信访问协议的定义。受信任的访问机制和受信任的访问协议都可以在无线网络中使用。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号