Design and analysis on trusted network equipment access authentication protocol

被引:7
作者
Lai, Yingxu [1 ]
Chen, Yinong [2 ]
Zou, Qichen [1 ]
Liu, Zenghui [3 ]
Yang, Zhen [1 ]
机构
[1] Beijing Univ Technol, Coll Comp Sci, Beijing 100124, Peoples R China
[2] Arizona State Univ, Sch Comp Informat & Decis Syst Engn, Tempe, AZ 85287 USA
[3] Beijing Polytech, Automat Engn Inst, Beijing 100176, Peoples R China
关键词
Trusted network equipment; Authentication; Security protocol; BAN logic; Attack detection model;
D O I
10.1016/j.simpat.2014.10.011
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Cloud security is a system engineering problem. A common approach to address the problem is to adapt existing Trusted Network Connection (TNC) framework in the cloud environment, which can be used to assess and verify end clients' system state. However, TNC cannot be applied to network equipment attached to the cloud computing environment directly. To allow the network devices to access the trusted network devices safely and reliably, we first developed a Trusted Network Equipment Access Authentication Protocol (TNEAAP). We use the BAN logic system to prove that TNEAAP is secure and credible. We then configure the protocol in an attack detection mode to experimentally show that the protocol can withstand attacks in the real network. Experiment results show that all the nine goals that decide the protocol's security have been achieved. (C) 2014 Elsevier B.V. All rights reserved.
引用
收藏
页码:157 / 169
页数:13
相关论文
共 29 条
[1]  
An'an Luo, 2007, 2007 32nd IEEE Conference on Local Computer Networks, P1069, DOI 10.1109/LCN.2007.60
[2]  
[Anonymous], ISSE SECURE 2007 SEC
[3]  
[Anonymous], J CHINA I COMMUN
[4]  
[Anonymous], 2006, ACM Transactions on Sensor Networks, DOI [10.1145/1218556.1218559, DOI 10.1145/1218556.1218559]
[5]  
[Anonymous], TPM MAIN SPEC VERS 1
[6]  
[Anonymous], TCG TRUST NETW CONN
[7]  
[Anonymous], 1993, RFC 1510
[8]  
[Anonymous], ISSE 2008 SEC EL BUS
[9]  
[Anonymous], 1996, RFC1994
[10]  
[Anonymous], TCG STOR ARCH COR SP