{"title":"A Trusted Authentication Scheme for Wireless Networks Using Direct Anonymous Attestation","authors":"Li Yang, Jianfeng Ma, Zhihong Liu, Ruofan Zheng","doi":"10.1109/iNCoS.2012.62","DOIUrl":null,"url":null,"abstract":"Not only user identities but also the platforms need to be authenticated in wireless networks under trusted computing environment. Based on direct anonymous attestation of trusted computing, a wireless anonymous authentication scheme is proposed, the platform of the mobile node was verified by the foreign network agent and the identity of the mobile node user was authenticated by the home network agent and the foreign network agent together. By using of direct anonymous attestation, temporary identities and one time secret keys, the property of platform anonymity, identity anonymity and domain separation are achieved. The analysis shows that our scheme is secure, reliable, and with higher performance.","PeriodicalId":287478,"journal":{"name":"2012 Fourth International Conference on Intelligent Networking and Collaborative Systems","volume":"92 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2012-09-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2012 Fourth International Conference on Intelligent Networking and Collaborative Systems","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/iNCoS.2012.62","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 2
Abstract
Not only user identities but also the platforms need to be authenticated in wireless networks under trusted computing environment. Based on direct anonymous attestation of trusted computing, a wireless anonymous authentication scheme is proposed, the platform of the mobile node was verified by the foreign network agent and the identity of the mobile node user was authenticated by the home network agent and the foreign network agent together. By using of direct anonymous attestation, temporary identities and one time secret keys, the property of platform anonymity, identity anonymity and domain separation are achieved. The analysis shows that our scheme is secure, reliable, and with higher performance.