抽象的

Vehicle network application node security authentication based on trusted computing and direct anonymous attestation

Ren Shuai, Zhao Xiangmo, Zhang Tao, Lou Zongzong


Security is a basic requirement for vehicle network or other networks. But there is little security strategy special for vehicle network. The existing network security strategy, which applies to fixed network very well, cannot satisfy the requirement of vehicle network. In this paper, trusted computing and direct anonymous attestation theories are adopted to establish protocol system of trusted vehicle information authentication, thus the security of authentication process for nodes in vehicle network can be improved. It is illustrated that the efficiency of verification can be increased and the possibility of being attacked can be decreased.


免责声明: 此摘要通过人工智能工具翻译,尚未经过审核或验证

索引于

  • 中国社会科学院
  • 谷歌学术
  • 打开 J 门
  • 中国知网(CNKI)
  • 引用因子
  • 宇宙IF
  • 研究期刊索引目录 (DRJI)
  • 秘密搜索引擎实验室
  • 欧洲酒吧
  • ICMJE

查看更多

期刊国际标准号

期刊 h 指数

Flyer