Application of Direct Anonymous Attestation to the Ad Hoc Networks Security
Abstract:
As Ad Hoc networks own characteristics, the existing fixed
network security strategy can not be effectively implemented. Direct Anonymous
Attestation theory will be imported into Ad Hoc networks based on researching
the Ad Hoc network. To optimize authentication link of the Ad Hoc networks,
we make use of trusted computing platform module in hardware level and Direct
Anonymous Attestation theory. The application effectively solves the Ad Hoc
nodes security issues, thus raising the Ad Hoc network against attacks.
How to cite this article
Tao Zhang and Shuai Ren, 2013. Application of Direct Anonymous Attestation to the Ad Hoc Networks Security. Journal of Applied Sciences, 13: 3320-3324.
REFERENCES
Cho, J.H., A. Swami and I.R. Chen, 2010. A survey on trust management for mobile ad hoc networks. IEEE Commun. Surv. Tutorials, 13: 562-583.
CrossRef Direct Link
Chim, T.W., S.M. Yiu, L.C. Hui and V.O. Li, 2011. PASS: Privacy-preserving authentication scheme for smart grid network. Proceedings of the IEEE International Conference on Smart Grid Communications, October 17-20, 2011, Brussels, Belgium , pp: 196-201.
Catalano, D., M. Di Raimondo, D. Fiore and M. Messina, 2011. Zero-knowledge sets with short proofs. IEEE Trans. Inform. Theory, 57: 2488-2502.
CrossRef
Day, J.N., T.T.H. Chau, M. Wolbers, P.P. Mai and N.T. Dung et al., 2013. Combination antifungal therapy for cryptococcal meningitis. N. Engl. J. Med., 368: 1291-1302.
CrossRef
Li, F. and Y. Wang, 2007. Routing in vehicular ad hoc networks: A survey. IEEE Veh. Technol. Mag., 2: 12-22.
CrossRef Direct Link
Gros, J., R. Ostrovsky and A. Sahai, 2012. New techniques for noninteractive aero-knowledge. J. ACM, Vol. 59.
CrossRef
He, D., J. Bu, S. Chan, C. Chen and M. Yin, 2011. Privacy-preserving universal authentication protocol for wireless communications. IEEE Trans. Wireless Commun., 10: 431-436.
CrossRef
Kale, M.R.A., S.R. Gupta and R.B. Prmit, 2013. An overview of manet ad hoc network. Int. J. Comput. Sci. Appl., 6: 223-227.
Direct Link
Othman, H., H. Hashim and J.L. Ab Manan, 2010. A conceptual framework providing Direct Anonymous Attestation (DAA) protocol in trusted location-based services (LBS). Proceedings of the International Conference on Internet Technology and Secured Transactions, November 8-11, 2010, London, UK., pp: 1-7.
Zheng, R. and R. Kravets, 2005. On-demand power management for ad hoc networks. Ad Hoc Networks, 3: 51-68.
CrossRef Direct Link
Shen, Z. and Q. Tong, 2010. The security of cloud computing system enabled by trusted computing technology. Proceedings of the 2nd International Conference on Signal Processing Systems, Volume 2, July 5-7, 2010, Dalian, China, pp: V2-11-V2-15.
Xue, X. and J. Ding, 2012. LPA: A new location‐based privacy‐preserving authentication protocol in VANET. Secur. Commun. Networks, 5: 69-78.
CrossRef
Yeh, L.Y., Y.C. Chen and J.L. Huang, 2011. PAACP: A portable privacy-preserving authentication and access control protocol in vehicular ad hoc networks. Comput. Commun., 34: 447-456.
CrossRef
© Science Alert. All Rights Reserved