Abstract

Trusted computing technology provides powerful support for the solution to security issues of embedded endpoints in mobile computing environment. When an endpoint connects to the network, the predefined security policy should be checked. Only the one that meets the security policy will be allowed to access to the network. Meanwhile, the one that does not meet the security policy will be isolated. Therefore all the insecure endpoints will be refused to access the network automatically until they satisfy the policy. A lot of wireless network security issues can be solved effectively by making use of trusted endpoints and trusted access technology. In this paper, a solution to construct the hardware and software of embedded trusted endpoints is proposed, and a trusted access mechanism based on the 802.1X and trusted network connection (TNC) technology defined by Trusted Computing Group is discussed, and the design and implementation of a trusted access protocol is given. Both the trusted access mechanism and the trusted access protocol can be used in wireless networks.

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call