JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE) ›› 2014, Vol. 49 ›› Issue (11): 82-88.doi: 10.6040/j.issn.1671-9352.2.2014.140

Previous Articles     Next Articles

A trusted inter-domain access control scheme for enterprise WLAN

LÜ Meng, LIU Zhe, LIU Jian-wei   

  1. School of Electronics and Information Engineering, Beihang University, Beijing 100191, China
  • Received:2014-06-24 Revised:2014-10-17 Online:2014-11-20 Published:2014-11-25

Abstract: WLAN has been an essential technology for enterprise Network. However, because of the lack of platform integrity verification mechanism and effective inter-domain access control mechanism, it is difficult to efficiently support emerging applications such as mobile cloud storage.A novel TPM-based WLAN access control scheme was proposed which uses TPM and Attribute-based access control to extend the trust chain from platform to the whole enterprise network and perform fine-grained access control, which ensure that the enterprise WLAN is secure and trusted.

Key words: TPM, fine-grained access control, attribute-based encryption, trust chain, mobile office

CLC Number: 

  • TP393
[1] 张焕国, 赵波.可信计算[M]. 武汉:武汉大学出版社, 2011. ZHANG Huanguo, ZHAO Bo. Trusted computing [M]. Wuhan: Wuhan University Press, 2011.
[2] 张焕国, 陈璐, 张立强. 可信网络连接研究[J]. 计算机学报, 2010, 33(1):706-717. ZHANG Huanguo, CHEN Lu, ZHANG Liqiang. Research on trusted network connection[J]. Chinese Journal of Computers, 2010, 33(1):706-717.
[3] TPM T C G. Main part 1 design principles specification version 1.2[EB/OL].[2014-02-08]. http://www.trustedcomputinggroup.org.
[4] Tusted Computing Group. Trusted network connect architecture for interoperability [EB/OL]. [2014-01-25].http://www. trustedcomputinggroup.org/.
[5] 池亚平, 杨磊, 李兆斌, 等. 基于EAP-TLS的可信网络连接认证方案设计与实现[J]. 计算机工程与科学, 2011, 33(4):8-12. CHI Yaping, YANG Lei, LI Zhaobin, et al. Design and implementation ofan authentication scheme for trustednetwork connection based on EAP-TLS[J]. Computer Engineering & Science, 2011, 33(4):8-12.
[6] XIAO P, HE J, FU Y, et al. Mutual access authentication in wireless wearable networks based on trusted platform module[J]. Journal of Convergence Information Technology, 2012, 7(7):148-156.
[7] 马卓, 马建峰, 杨超, 等. 无线环境下的可信网络连接协议[J]. 北京工业大学学报, 2010, 36(5):577-581. MA Zhuo, MA Jianfeng, YANG Chao, et al. Trusted network connect protocol for wireless environment[J]. Journal of Beijing University of Technology, 2010, 36(5):577-581.
[8] LI Guoqin, JIANG Yu, HU Aiqun. Study on application of TNC technology in mobile office[C]// Proceedings of International Conference on Multimedia Information Networking and Security (MINES). Los Alamitos: IEEE Computer Society, 2010: 799-803.
[9] JIANG Yi, LV Weike, LIU Xiangbin. Research of trust chain improvement technology[C]// Proceedings of 2010 International Conference on Networks Security, Wireless Communications and Trusted Computing. Los Alamitos: IEEE Computer Society, 2010: 294-297.
[10] BETHENCOURT J, SAHAI A, WATERS B. Ciphertext-policy attribute-based encryption[C]// Proceedings of IEEE Symposium on Security and Privacy(SP'07). Los Alamitos: IEEE Computer Society, 2007: 321-334.
[11] BETHENCOURT J, SAHAI A, WATERS B.Thecpabe toolkit[EB/OL].[2014-01-25].http://acsc.csl.sri.com/cpabe/.
[1] HUANG Yu-qing, ZHAO Bo, XIAO Yu, TAO Wei. A vTPM-VM live migration scheme based on KVM [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2017, 52(6): 69-75.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!