Application of direct anonymous attestation to the Ad Hoc networks security

被引:0
作者
Zhang, Tao [1 ]
Ren, Shuai [2 ]
机构
[1] School of Electronic and Control Engineering, Chang'an University, Xi'an
[2] School of Information Engineering, Chang'an University, Xi'an
关键词
Ad hoc network; Direct anonymous attestation; Network security; Zero-knowledge proof;
D O I
10.3923/jas.2013.3320.3324
中图分类号
学科分类号
摘要
As Ad Hoc networks own characteristics, the existing fixed network security strategy can not be effectively implemented. Direct Anonymous Attestation theory will be imported into Ad Hoc networks based on researching the Ad Hoc network. To optimize authentication link of the Ad Hoc networks, we make use of trusted computing platform module in hardware level and Direct Anonymous Attestation theory. The application effectively solves the Ad Hoc nodes security issues, thus raising the Ad Hoc network against attacks. © 2013 Asian Network for Scientific Information.
引用
收藏
页码:3320 / 3324
页数:4
相关论文
共 13 条
  • [1] Catalano D., Di Raimondo M., Fiore D., Messina M., Zero-knowledge sets with short proofs, IEEE Trans. Inform. Theory, 57, pp. 2488-2502, (2011)
  • [2] Chim T.W., Yiu S.M., Huiand L.C., Li V.O., PASS: Privacy-preserving authentication scheme for smart grid network, Proceedings of the IEEE International Conference On Smart Grid Communications, pp. 196-201, (2011)
  • [3] Cho J.H., Swami A., Chen I.R., A survey on trust management for mobile ad hoc networks, IEEE Commnn. Surv. Tutorials, 13, pp. 562-583, (2010)
  • [4] Day J.N., Chau T.T.H., Wolbers M., Mai P.P., Dung N.T., Et al., Combination antifungal therapy for cryptococcal meningitis, N. Engl. J. Med, 368, pp. 1291-1302, (2013)
  • [5] Gros J., Ostrovsky R., Sahai A., New techniques for noninteractive aero-knowledge, J. ACM, 59, (2012)
  • [6] He D., Bu J., Chan S., Chen C., Yin M., Privacy-preserving universal authentication protocol for wireless communications, IEEE Trans. Wireless Commun, 10, pp. 431-436, (2011)
  • [7] Kale M.R.A., Gupta S.R., Prmit R.B., An overview of manet ad hoc network, Int. J. Comput. Sci. Appl, 6, pp. 223-227, (2013)
  • [8] Li F., Wang Y., Routing in vehicular ad hoc networks: A survey, IEEE Veh. Technol. Mag, 2, pp. 12-22, (2007)
  • [9] Othman H., Hashim H., Ab Manan J.L., A Conceptual Framework Providing Direct Anonymous Attestation (DAA) Protocol In Trusted Location-based Services (LBS), Proceedings of the International Conference On Internet Technology and Secured Transactions, (2010)
  • [10] Shen Z., Tong Q., The security of cloud computing system enabled by trusted computing technology, Proceedings of the 2nd International Conference On Signal Processing Systems, 2, (2010)