会议专题

Trusted Computing Enabled System for Wireless Networks

While bringing great flexibility to us, wireless networks also make active intrusions to be carried out a lot more conveniently. It is mainly because of the loose linkage between the hardware and virtual identity. In this paper, we adopt Trusted Computing (TC) technology with tamper-resistant hardware, to establish a trusted path for secure communication in wireless networks. We propose and design a TCG-compliant (Trusted Computing Group) system and apply it to a mutual authentication scenario. In support of our work, we illustrate how TCG specifications features can be used to implement our approach in mobile environment.

wireless security mutual authentication Trusted Computing (TC) transitive trust platform attestation

Jing Zhan Huanguo Zhang Liqiang Zhang Mingdi Xu

School of Computer Science Wuhan University Wuhan, China

国际会议

第三届IEEE无线通讯、网络技术暨移动计算国际会议

上海

英文

2007-09-21(万方平台首次上网日期,不代表论文的发表时间)