Title :
Trusted Network Connection Based on Object Fingerprints
Author :
Xiong Kun ; Ji Xing ; Yong, Gan
Author_Institution :
Sch. of Comput. & Commun. Eng., Zhengzhou Univ. of Light Ind., Zhengzhou, China
Abstract :
Traditional technology of network access controlling passive defense attacking by external hack, and cannot eliminate menace to network by some malicious network terminal. To solve this problem, authors proposed a new model of network connection based on objects fingerprints and discuss its work mechanism of certification and communication. Simulation results show that the model can not only ensure the trustworthiness of network connection and network communication, but also provide remediation services for those terminal users who fail to meet the security policy demand.
Keywords :
authorisation; computer network security; fingerprint identification; military communication; military computing; certification mechanism; malicious network terminal; network access technology; network communication mechanism; network connection trustworthiness; object fingerprint; passive defense attacking controlling; remediation service; security policy demand; trusted network connection; Computational modeling; Computers; Educational institutions; Fingerprint recognition; IP networks; Industries; Security;
Conference_Titel :
Internet Technology and Applications (iTAP), 2011 International Conference on
Conference_Location :
Wuhan
Print_ISBN :
978-1-4244-7253-6
DOI :
10.1109/ITAP.2011.6006349