首页 | 本学科首页   官方微博 | 高级检索  
     

关于IMC/IMV的网络设备可信认证方法研究
引用本文:刘丽伟,孙践知,谭励,杨斌. 关于IMC/IMV的网络设备可信认证方法研究[J]. 计算机工程与应用, 2019, 55(9): 79-86. DOI: 10.3778/j.issn.1002-8331.1802-0024
作者姓名:刘丽伟  孙践知  谭励  杨斌
作者单位:北京工商大学 计算机与信息工程学院 食品安全大数据技术北京市重点实验室,北京,100048;中国人民解放军 96901部队 25分队
基金项目:国家自然科学基金;北京市自然科学基金
摘    要:近年来,网络设备的安全问题日益凸显。如果网络设备不可信,网内所有计算机都可能面临被攻击的危险,所有数据也都可能面临被窃取的危险。所以网络设备是否安全地接入网络直接影响到整个网络的安全。提出了一种基于IMC/IMV的网络设备可信认证方法,在完成传统的平台身份认证的同时,进行平台可信状态验证,通过设计的完整性收集器(Integrity Measurement Collector,IMC)收集网络设备的可信状态信息,通过协议的多轮交互提交给完整性验证器(Integrity Measurement Verifier,IMV)进行验证,完成平台的完整性认证。实验表明,这种认证方式在实现网络设备的可信认证的同时,对系统性能的影响不大。

关 键 词:可信网络  设备认证  完整性收集器(IMC)  完整性验证器(IMV)

Research on Trusted Authentication Method of Network Device Based on IMC/IMV
LIU Liwei,SUN Jianzhi,TAN Li,YANG Bin. Research on Trusted Authentication Method of Network Device Based on IMC/IMV[J]. Computer Engineering and Applications, 2019, 55(9): 79-86. DOI: 10.3778/j.issn.1002-8331.1802-0024
Authors:LIU Liwei  SUN Jianzhi  TAN Li  YANG Bin
Affiliation:1.School of Computer and Information Engineering, Beijing Technology and Business University, Beijing 100048, China2.Unit 96901 Force 25 of PLA, China
Abstract:In recent years, the security issues on network device have been increasingly prominent. If the network devices are not trusted, all computers in the net are likely to be in the risk of being attacked and all data being stolen. Whether the network devices access network in security or not directly affects the safety of the whole network. It presents a trusted authentication method based on IMC/IMV for network devices. Under this method, the traditional platform identity authentication is carried out and the trusted status verification of the platform is carried out too. The network device’s trusted status information is collected by Integrity Measurement Collector(IMC) and verified by Integrity Measurement Verifier(IMV), to which the information are submitted by multiple rounds protocol interactions. The final experiments show that this authentication method effects little on system performance when the network device are under trusted authentication.
Keywords:trusted network  device authentication  Integrity Measurement Collector(IMC)  Integrity Measurement Verifier(IMV)  
本文献已被 维普 万方数据 等数据库收录!
点击此处可从《计算机工程与应用》浏览原始摘要信息
点击此处可从《计算机工程与应用》下载免费的PDF全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号