Trusted Computing Enabled System for Wireless Networks
While bringing great flexibility to us, wireless networks also make active intrusions to be carried out a lot more conveniently. It is mainly because of the loose linkage between the hardware and virtual identity. In this paper, we adopt Trusted Computing (TC) technology with tamper-resistant hardware, to establish a trusted path for secure communication in wireless networks. We propose and design a TCG-compliant (Trusted Computing Group) system and apply it to a mutual authentication scenario. In support of our work, we illustrate how TCG specifications features can be used to implement our approach in mobile environment.
wireless security mutual authentication Trusted Computing (TC) transitive trust platform attestation
Jing Zhan Huanguo Zhang Liqiang Zhang Mingdi Xu
School of Computer Science Wuhan University Wuhan, China
国际会议
上海
英文
2007-09-21(万方平台首次上网日期,不代表论文的发表时间)