کد مقاله کد نشریه سال انتشار مقاله انگلیسی نسخه تمام متن
491754 720657 2015 13 صفحه PDF دانلود رایگان
عنوان انگلیسی مقاله ISI
Design and analysis on trusted network equipment access authentication protocol
ترجمه فارسی عنوان
طراحی و تجزیه و تحلیل پروتکل تصدیق دسترسی به تجهیزات شبکه مورد اعتماد
موضوعات مرتبط
مهندسی و علوم پایه مهندسی کامپیوتر علوم کامپیوتر (عمومی)
چکیده انگلیسی

Cloud security is a system engineering problem. A common approach to address the problem is to adapt existing Trusted Network Connection (TNC) framework in the cloud environment, which can be used to assess and verify end clients’ system state. However, TNC cannot be applied to network equipment attached to the cloud computing environment directly. To allow the network devices to access the trusted network devices safely and reliably, we first developed a Trusted Network Equipment Access Authentication Protocol (TNEAAP). We use the BAN logic system to prove that TNEAAP is secure and credible. We then configure the protocol in an attack detection mode to experimentally show that the protocol can withstand attacks in the real network. Experiment results show that all the nine goals that decide the protocol’s security have been achieved.

ناشر
Database: Elsevier - ScienceDirect (ساینس دایرکت)
Journal: Simulation Modelling Practice and Theory - Volume 51, February 2015, Pages 157–169
نویسندگان
, , , , ,