Serwis Infona wykorzystuje pliki cookies (ciasteczka). Są to wartości tekstowe, zapamiętywane przez przeglądarkę na urządzeniu użytkownika. Nasz serwis ma dostęp do tych wartości oraz wykorzystuje je do zapamiętania danych dotyczących użytkownika, takich jak np. ustawienia (typu widok ekranu, wybór języka interfejsu), zapamiętanie zalogowania. Korzystanie z serwisu Infona oznacza zgodę na zapis informacji i ich wykorzystanie dla celów korzytania z serwisu. Więcej informacji można znaleźć w Polityce prywatności oraz Regulaminie serwisu. Zamknięcie tego okienka potwierdza zapoznanie się z informacją o plikach cookies, akceptację polityki prywatności i regulaminu oraz sposobu wykorzystywania plików cookies w serwisie. Możesz zmienić ustawienia obsługi cookies w swojej przeglądarce.
Wireless Ad Hoc network is vulnerable to attacks due to its open and decentralized properties. This paper proposes a trusted connection based scheme for Ad Hoc network to prevent attacks. A trusted architecture is introduced into the node platform, which consists of two phases, platform identity verification and platform integrity measurement. For a communication requirement of two nodes, the terminal...
Signatures responsible for authentication, authorization, etc, are important in many workflow applications. Most studies associated with signatures are focused on digital signatures only, and modeling of signature workflows is seldom studied. However, the dependencies between signatures can be complex, and thus modeling signature workflows becomes time consuming and error-prone. In this paper, we...
Vehicle network is popular gradually. For more security in vehicle network, a trusted AAA (Authentication, Authorization and Accounting) environment for vehicle network must be established. The paper proposes an approach to establish such an environment using combination of two next generation AAA protocols, PANA (Protocol for carrying Authentication for Network Access) and Diameter. The ability of...
Trusted network connect (TNC), whose goal is to improve network security from source, now has become hot topic in security domain. We proposed a new access model for the terminals without meeting the requirements in TNC specifications. Also we discussed the work flow and communication process of presented model. Simulations show that the feasibility of the presented model used in the scenario where...
In order to enhance the security of vehicular ad hoc networks (VANETs). By dividing the roadside units (RSUs) into application-RSUs (AP-RSUs) and authentication-RSUs (AU-RSUs) in application layer, we give a new security scheme for VANETs. This functional division of RSUs makes VANETs more logically clear. AU-RSUs record vehicles' real identities and assign temporary certificates to them. The temporary...
Future mobile devices are expected to access different networks (such as 3rd generation network, WLAN, Bluetooth, Internet, and etc). Hence many sensitivity data are stored in them. How to protect the security of information and applications about mobile devices becomes an exigent problem. This paper proposes a secure authentication and authorization protocol for mobile devices. The protocol employs...
Vehicular ad hoc networks (VANETs) have many new characteristics unlike traditional network, such as centriclessness, mobility and multi-hop transmission, which invalidate conventional key managements. The fast development and successful application of trusted computing technology provide a potential solution to achieve effective authentication and trust evaluation. According to the VANETs with hierarchy...
Recently trusted network becomes hot topic in network security domain. By introducing the concept of "trusted attribute", we proposed grade division scheme, which was called hierarchy trusted network framework (HTNF). Also we detailedly explained the partition rules of trusted attributes and the approach to grade division. We discussed the potential applications of presented framework, and...
Although trusted computing group proposed the concept of trusted remediation, the detailed implementations are not given, and also how to build isolated environment was not involved. A new trusted remediation model called TRNM was put forward. Also the implementations of the presented model were given. Moreover, the communication and authentication process of presented model were discussed. Simulations...
A new and feasible trusted remediation model was put forward, and the functions as well as the work flow of remediation model were explained in detail. Moreover, the communication and authentication process of remediation model were discussed. Simulations results show that by the proposed model, not only the safety and reliability of network can be ensured, but also the convenient and reliable remediation...
A smart card based scheme is practical and widely used in remote mutual authentication. In 2006, Shieh-Wang pointed out the weakness of Juangpsilas remote mutual authentication scheme using smart card and further proposed a novel one to improve Juangpsilas. The advantages in Shieh-Wangpsilas scheme include effective mutual authentication, freely chosen password, no verification tables, low computational...
The trusted network connect (TNC) is based on the double concepts of integrity and identity. The policy enforcement point (PEP) in TNC architecture is deeply studied and powerful broadband remote access server (BRAS) is also applied into the architecture. The new BRAS model is able to set up access control rules in accordance with the level of trust, filter traffic according to filtering rules and...
Wireless sensor networks are edging closer to widespread feasibility with recent research showing promising results in developing and adapting new mechanisms to suit their environment. Secure communication between these distributed wireless devices is a desired characteristic, especially in scenarios where these sensors will be exploited for military and other mission-critical operations. This paper...
Podaj zakres dat dla filtrowania wyświetlonych wyników. Możesz podać datę początkową, końcową lub obie daty. Daty możesz wpisać ręcznie lub wybrać za pomocą kalendarza.