DocumentCode
514641
Title
The Ad Hoc Network Security Research Based on Trusted Computing and Semantic Remote Attestation
Author
Liu, Mingsheng ; Meng, Qingli ; He, Yuemei ; Cheng, Dongdong
Author_Institution
Sch. of Inf. & Election Eng., Hebei Univ. of Eng., Handan, China
Volume
1
fYear
2010
fDate
6-7 March 2010
Firstpage
724
Lastpage
727
Abstract
As the Ad Hoc network routing protocols have security problems, if there is no protective measures to guard against, it would lead to passive eavesdropping, active intrusion, denial of service, "black hole", power-consumption and other network attacks. In order to ensure reliable transmission of the nodes data in the network, the paper proposes a new security authentication technology. It combines with the trusted computing platforms and semantic remote attestation technology to authentication the Ad Hoc network nodes, so that before the communication and in the communication process will be dynamic security authentication for each node, so as to ensure the data of nodes safe and reliable.
Keywords
ad hoc networks; authorisation; cryptographic protocols; routing protocols; telecommunication security; active intrusion; ad hoc network security; black hole; denial of service; dynamic security authentication technology; passive eavesdropping; power-consumption; routing protocols; semantic remote attestation; trusted computing; Ad hoc networks; Authentication; Computer crime; Computer networks; Computer security; Data security; Information security; Network topology; Power engineering and energy; Routing protocols; Ad Hoc; Network Security; Semantic Remote Attestation; Trusted Computing;
fLanguage
English
Publisher
ieee
Conference_Titel
Education Technology and Computer Science (ETCS), 2010 Second International Workshop on
Conference_Location
Wuhan
Print_ISBN
978-1-4244-6388-6
Electronic_ISBN
978-1-4244-6389-3
Type
conf
DOI
10.1109/ETCS.2010.256
Filename
5458673
Link To Document