Design and analysis on trusted network equipment access authentication protocol

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Design and analysis on trusted network equipment access authentication protocol

Cloud security is a system engineering problem. A common approach to address the problem is to adapt existing Trusted Network Connection (TNC) framework in the cloud environment, which can be used to assess and verify end clients’ system state. However, TNC cannot be applied to network equipment attached to the cloud computing environment directly. To allow the network devices to access the tru...

متن کامل

Protocol for Carrying Authentication for Network Access (PANA) Relay Element

This document specifies Protocol for carrying Authentication for Network Access (PANA) Relay Element functionality, which enables PANA messaging between a PANA Client (PaC) and a PANA Authentication Agent (PAA) where the two nodes cannot reach each other by means of regular IP routing. Information about the current status of this document, any errata, and how to provide feedback on it may be ob...

متن کامل

Protocol for Carrying Authentication for Network Access (PANA)

This document is subject to BCP 78 and the IETF Trust’s Legal Provisions Relating to IETF Documents (http://trustee.ietf.org/license-info) in effect on the date of publication of this document. Please review these documents carefully, as they describe your rights and restrictions with respect to this document. Code Components extracted from this document must include Simplified BSD License text...

متن کامل

Unified Authentication Scheme Based on IBE in Trusted Network

The existing unified authentication schemes are based on Public Key Infrastructure (PKI)/Privilege Management Infrastructure (PMI), WS-Security, Kerberos etc. But they can't support the developing Trusted Network Connect (TNC) environment. To solve the problem, a unified authentication scheme supporting multi-authentication modes based on Identity-Based Encryption (IBE) in trusted network named...

متن کامل

HMAC-Based Authentication Protocol: Attacks and Improvements

As a response to a growing interest in RFID systems such as Internet of Things technology along with satisfying the security of these networks, proposing secure authentication protocols are indispensable part of the system design. Hence, authentication protocols to increase security and privacy in RFID applications have gained much attention in the literature. In this study, security and privac...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Simulation Modelling Practice and Theory

سال: 2015

ISSN: 1569-190X

DOI: 10.1016/j.simpat.2014.10.011