Journal of Computer Applications ›› 2014, Vol. 34 ›› Issue (7): 1936-1940.DOI: 10.11772/j.issn.1001-9081.2014.07.1936

Previous Articles     Next Articles

Network interconnection model based on trusted computing

LIU Yibo,YIN Xiaochuan,GAO Peiyong,ZHANG Yibo   

  1. College of Information and Navigation, Air Force Engineering University, Xi'an Shaanxi 710077, China
  • Received:2013-12-30 Revised:2014-02-20 Online:2014-07-01 Published:2014-08-01
  • Contact: LIU Yibo

基于可信计算的网络互联模型

刘一博,殷肖川,高培勇,张毅卜   

  1. 空军工程大学 信息与导航学院, 西安 710077
  • 通讯作者: 刘一博
  • 作者简介:刘一博(1991-),男,河南洛阳人,硕士研究生,主要研究方向:网络与信息对抗;殷肖川(1961-),男,湖北武汉人,教授,主要研究方向:网络与信息对抗;高培勇(1989-),男,河南郑州人,硕士研究生,主要研究方向:无线自组织网络;张毅卜(1989-),男,陕西西安人,硕士研究生,主要研究方向:网络流量测量。

Abstract:

Problem of intranet security is almost birth with network interconnection, especially when the demand for network interconnection is booming throughout the world. The traditional technology can not achieve both security and connectivity well. In view of this,a method was put forward based on trusted computing technology. Basic idea is to build a trusted model about the network interconnection system,and the core part of this model is credible on access to the person's identity and conduct verification:first, the IBA algorithm is reformed to design an cryptographic protocol between authentication system and accessors,and the effectiveness is analyzed in two aspects of function and accuracy; second,an evaluation tree model is established through the analysis of the entity sustainable behavior, so the security situation of access terminals can be evaluated.At last,the evaluation method is verified through an experiment.

摘要:

针对传统互联技术难以实现内外网在安全可信情况下互联互通互操作的问题,将可信计算中的相关技术应用到网络互联中,实现内外网在安全隔离情况下的信息交互。研究了网络可信互联框架模型,结合该模型,对基于身份的公钥认证算法进行改进,设计了认证系统与接入者之间的密码协议。分析实体的持续性行为进行并建立评估树模型,对接入者自身的安全状况进行综合可信度评估。最后,通过测试实验对评估方法进行分析与验证,实验结果表明,该评估模型排除时效偏差等不利因素的影响,具有可行性和有效性。

CLC Number: