scispace - formally typeset
Proceedings ArticleDOI

Provably Secure Trusted Access Protocol for WLAN Mesh Networks

Zhuo Ma, +2 more
- Vol. 2, pp 43-48
Reads0
Chats0
TLDR
A provably secure trusted access protocol MN-TAP for the WLAN Mesh Networks is proposed, which will achieve authentication and key confirmation among the access requestor, policy enforcement point and policy decision point within 4 protocol rounds.
Abstract
Available WLAN Mesh network access protocols and trusted network connect protocols can not satisfy the performance and security requirements of WLAN Mesh networks in trusted environment. A provably secure trusted access protocol MN-TAP for the WLAN Mesh Networks is proposed. Such protocol will achieve authentication and key confirmation among the access requestor, policy enforcement point and policy decision point within 4 protocol rounds. Meanwhile, the protocol can realize the platform authentication and platform integrity verification in the first round of protocol interaction, which will improve the efficiency of the protocol and decrease the overhead of the server. We use a provably secure model, named the universally composable secure model, to analyze the security of the protocol. And we use of compare analysis to discover the performance advantages of the protocol. The results show that: the protocol is a UC-secure protocol, and the performance has great advantages over the current protocols.

read more

Citations
More filters
Journal ArticleDOI

Verification of Trusted Network Access Protocols in the Strand Space Model

TL;DR: It is pointed out Zhuo Ma et al.'s MN-TAP protocol is unsecure based on the Strand Space Model (SSM), and improvements are given to improve the MN- TAP protocol and it is shown that the improved protocol is secure in the SSM.
References
More filters
Proceedings ArticleDOI

Universally composable security: a new paradigm for cryptographic protocols

TL;DR: The notion of universally composable security was introduced in this paper for defining security of cryptographic protocols, which guarantees security even when a secure protocol is composed of an arbitrary set of protocols, or more generally when the protocol is used as a component of a system.
Proceedings Article

Design and implementation of a TCG-based integrity measurement architecture

TL;DR: This work shows that many of the Microsoft NGSCB guarantees can be obtained on today's hardware and today's software and that these guarantees do not require a new CPU mode or operating system but merely depend on the availability of an independent trusted entity, a TPM for example.
Proceedings ArticleDOI

Attestation-based policy enforcement for remote access

TL;DR: This prototype illustrates that the novel system that empowers corporations to verify client integrity properties and establish trust upon the client policy enforcement before allowing clients (remote) access to corporate Intranet services integrates seamlessly into scalable corporate policy management and introduces only a minor performance overhead.
Proceedings ArticleDOI

Linking remote attestation to secure tunnel endpoints

TL;DR: This work examines here how to link specific properties of a remote system "gained through TPM-based attestation" to secure tunnel endpoints to counter attacks where a compromised authenticated SSL endpoint relays the TPM based attestation to another system.
Book ChapterDOI

Trusted computing: strengths, weaknesses and further opportunities for enhancing privacy

TL;DR: How trusted computing technology can enhance privacy, both in the short and long term, and a variety of examples are provided, and potential negative privacy implications are assessed.
Related Papers (5)