抽象的な

Vehicle network application node security authentication based on trusted computing and direct anonymous attestation

Ren Shuai, Zhao Xiangmo, Zhang Tao, Lou Zongzong


Security is a basic requirement for vehicle network or other networks. But there is little security strategy special for vehicle network. The existing network security strategy, which applies to fixed network very well, cannot satisfy the requirement of vehicle network. In this paper, trusted computing and direct anonymous attestation theories are adopted to establish protocol system of trusted vehicle information authentication, thus the security of authentication process for nodes in vehicle network can be improved. It is illustrated that the efficiency of verification can be increased and the possibility of being attacked can be decreased.


インデックス付き

  • キャス
  • Google スカラー
  • Jゲートを開く
  • 中国国家知識基盤 (CNKI)
  • サイテファクター
  • コスモスIF
  • 研究ジャーナル索引作成ディレクトリ (DRJI)
  • 秘密検索エンジン研究所
  • ユーロパブ
  • ICMJE

もっと見る

ジャーナルISSN

ジャーナル h-インデックス

Flyer

オープンアクセスジャーナル