Description

Cloud security is a system engineering problem. A common approach to address the problem is to adapt existing Trusted Network Connection (TNC) framework in the cloud environment, which can be used to assess and verify end clients’ system state. However,

Cloud security is a system engineering problem. A common approach to address the problem is to adapt existing Trusted Network Connection (TNC) framework in the cloud environment, which can be used to assess and verify end clients’ system state. However, TNC cannot be applied to network equipment attached to the cloud computing environment directly. To allow the network devices to access the trusted network devices safely and reliably, we first developed a Trusted Network Equipment Access Authentication Protocol (TNEAAP). We use the BAN logic system to prove that TNEAAP is secure and credible. We then configure the protocol in an attack detection mode to experimentally show that the protocol can withstand attacks in the real network. Experiment results show that all the nine goals that decide the protocol’s security have been achieved.

Downloads
pdf (1.5 MB)

Details

Title
  • Design and Analysis on Trusted Network Equipment Access Authentication Protocol
Contributors
Date Created
2015-02-01
Resource Type
  • Text
  • Collections this item is in
    Identifier
    Note
    • NOTICE: this is the author's version of a work that was accepted for publication in SIMULATION MODELLING PRACTICE AND THEORY. Changes resulting from the publishing process, such as peer review, editing, corrections, structural formatting, and other quality control mechanisms may not be reflected in this document. Changes may have been made to this work since it was submitted for publication. A definitive version was subsequently published in SIMULATION MODELLING PRACTICE AND THEORY, 51, 157-169. DOI: 10.1016/j.simpat.2014.10.011, opens in a new window

    Citation and reuse

    Cite this item

    This is a suggested citation. Consult the appropriate style guide for specific citation guidelines.

    Lai, Yingxu, Chen, Yinong, Zou, Qichen, Liu, Zenghui, & Yang, Zhen (2015). Design and analysis on trusted network equipment access authentication protocol. SIMULATION MODELLING PRACTICE AND THEORY, 51, 157-169. http://dx.doi.org/10.1016/j.simpat.2014.10.011

    Machine-readable links