Proceedings ArticleDOI
Provably Secure Trusted Access Protocol for WLAN Mesh Networks
Zhuo Ma,Jianfeng Ma,Shen Yulong +2 more
- Vol. 2, pp 43-48
Reads0
Chats0
TLDR
A provably secure trusted access protocol MN-TAP for the WLAN Mesh Networks is proposed, which will achieve authentication and key confirmation among the access requestor, policy enforcement point and policy decision point within 4 protocol rounds.Abstract:
Available WLAN Mesh network access protocols and trusted network connect protocols can not satisfy the performance and security requirements of WLAN Mesh networks in trusted environment. A provably secure trusted access protocol MN-TAP for the WLAN Mesh Networks is proposed. Such protocol will achieve authentication and key confirmation among the access requestor, policy enforcement point and policy decision point within 4 protocol rounds. Meanwhile, the protocol can realize the platform authentication and platform integrity verification in the first round of protocol interaction, which will improve the efficiency of the protocol and decrease the overhead of the server. We use a provably secure model, named the universally composable secure model, to analyze the security of the protocol. And we use of compare analysis to discover the performance advantages of the protocol. The results show that: the protocol is a UC-secure protocol, and the performance has great advantages over the current protocols.read more
Citations
More filters
Journal ArticleDOI
Verification of Trusted Network Access Protocols in the Strand Space Model
TL;DR: It is pointed out Zhuo Ma et al.'s MN-TAP protocol is unsecure based on the Strand Space Model (SSM), and improvements are given to improve the MN- TAP protocol and it is shown that the improved protocol is secure in the SSM.
References
More filters
Proceedings ArticleDOI
Universally composable security: a new paradigm for cryptographic protocols
TL;DR: The notion of universally composable security was introduced in this paper for defining security of cryptographic protocols, which guarantees security even when a secure protocol is composed of an arbitrary set of protocols, or more generally when the protocol is used as a component of a system.
Proceedings Article
Design and implementation of a TCG-based integrity measurement architecture
TL;DR: This work shows that many of the Microsoft NGSCB guarantees can be obtained on today's hardware and today's software and that these guarantees do not require a new CPU mode or operating system but merely depend on the availability of an independent trusted entity, a TPM for example.
Proceedings ArticleDOI
Attestation-based policy enforcement for remote access
TL;DR: This prototype illustrates that the novel system that empowers corporations to verify client integrity properties and establish trust upon the client policy enforcement before allowing clients (remote) access to corporate Intranet services integrates seamlessly into scalable corporate policy management and introduces only a minor performance overhead.
Proceedings ArticleDOI
Linking remote attestation to secure tunnel endpoints
TL;DR: This work examines here how to link specific properties of a remote system "gained through TPM-based attestation" to secure tunnel endpoints to counter attacks where a compromised authenticated SSL endpoint relays the TPM based attestation to another system.
Book ChapterDOI
Trusted computing: strengths, weaknesses and further opportunities for enhancing privacy
TL;DR: How trusted computing technology can enhance privacy, both in the short and long term, and a variety of examples are provided, and potential negative privacy implications are assessed.