Title :
Trust Model Based on TPM for Network Mobility
Author :
Huang, Songhua ; Cai, Jiang ; Kan, Yi ; Wang, Heng ; Huang, Hao
Author_Institution :
Nat. Key Lab. of Sci. & Technol. on C4ISR, Nanjing Res. Inst. of Electron. Eng., Nanjing, China
Abstract :
Under mobile environment, the third part trusted may not be reached at any time. Moreover, there exist attacks on overall performance and availability of mobile networks caused by deceit of legal users and compromised platforms. In this paper, trust model composed of identity authentication, platform integrity attestation and user behavior evaluation is raised for network mobility (NEMO). Where, identity authentication guarantees the authenticity of IP address, user and platform. Security analysis shows that the trust model blocks most of existing threats to NEMO by rejecting illegal users and problem terminals, and as well reduces negative impacts of legal users´ malicious acts on NEMO performance and availability by behavior evaluation and access router selection.
Keywords :
mobile handsets; security of data; TPM; identity authentication; illegal users; mobile network; network mobility; trust model; Authentication; IP networks; Law; Mobile communication; Mobile computing; Public key;
Conference_Titel :
Computational Intelligence and Software Engineering (CiSE), 2010 International Conference on
Conference_Location :
Wuhan
Print_ISBN :
978-1-4244-5391-7
Electronic_ISBN :
978-1-4244-5392-4
DOI :
10.1109/CISE.2010.5676899