Font Size: a A A

Certification Model In Trusted Wireless Access And Design

Posted on:2010-08-05Degree:MasterType:Thesis
Country:ChinaCandidate:P SunFull Text:PDF
GTID:2208360278479111Subject:Computer software and theory
Abstract/Summary:PDF Full Text Request
The wireless network plays a more and more important role in today society and the need of people for the wireless network increases day by day. However, the existence of the wireless network insecurity makes people distrust to the network, which limits the further development of the wireless network. Particularly, the existing technique of the WLAN can't provide dependable security for connecting into a protection, which causes many latent customers to hesit whether adopting the WLAN system. It brings WLAN promotion much severe influence. The concept of Trusted Computing provides a new way for the problem of the wireless terminal connecting security. The Trusted Computing turns the type of passive defense to the active type that commence from the terminal.By analyzing the characteristics of the WLAN and inducing the foundation that the security of the WLAN, this paper tallies up the the security need of the WLAN. Currently the main identity attestation protocols of wireless terminal that connects into a network, such as IEEE 802.1x, 802.11 and WAPI which our country independly develops, all depend on the external trust for oneself and neglect the security protection of the wireless terminal equipments. So we introduce the related concepts and main technologies of the Trusted Computing, then analyze and explain the main technique of the TNC and the mechanism of transitive trust and the model of integrity valuation in TNC. The main innovative works are as follows:1. It carries on authentic valuation to set up a model to the Web service which the TPM's core service TCS adopts. According to the definition of trust and reputation and the differences between them, this paper puts up a valuation model of trust and reputation—TCSTR. It gives a more flexible method to valuate trust degree and can more express the combination of the subjectivity and objectivity of trust by putting the reputation concept into the synthesization of recommendatory trust and using existing nodes as entities of saving reputation. Reputation can reflect the true reality of the situation through analyzing the result of the simulation.2. On the basis of TNC and thoroughly researches on the WAI security accessing process of WAPI-XG1 which is the National Standard designed by China for the WLAN, this paper proposes an improved WAI based on TPM by using integrity measurement, which is called TWAI. The scheme ensures the security and dependability of every communicating section with the functions of TPM such as local protection and platform attestation. Then this paper analyzes the security with CK model and in the aspect of the trustworthiness. The result indicates that TWAI can achieve the goals such as integrity protection of entitys and two-way authentication, which enhances the security of WAI.
Keywords/Search Tags:trusted computing, trust and reputation model, WAPI, TPM
PDF Full Text Request
Related items