期刊文献+
共找到606篇文章
< 1 2 31 >
每页显示 20 50 100
A Behavior-Based Remote Trust Attestation Model 被引量:10
1
作者 ZHANG Huanguo WANG Fan 《Wuhan University Journal of Natural Sciences》 CAS 2006年第6期1819-1822,共4页
While remote trust attestation is a useful concept to detect unauthorized changes to software, the current mechanism only ensures authenticity at the start of the operating system and cannot ensure the action of runni... While remote trust attestation is a useful concept to detect unauthorized changes to software, the current mechanism only ensures authenticity at the start of the operating system and cannot ensure the action of running software. Our approach is to use a behavior-based monitoring agent to make remote attestation more flexible, dynamic, and trustworthy. This approach was mostly made possible by extensive use of process information which is readily available in Unix. We also made use of a behavior tree to effectively record predictable behaviors of each process. In this paper, we primarily focus on building a prototype implementation of such framework, presenting one example built on it, successfully find potential security risks in the run time of a ftp program and then evaluate the performance of this model. 展开更多
关键词 remote attestation trusted computing trusted platform behavior monitoring agent behavior tree
在线阅读 下载PDF
A Method to Implement Full Anonymous Attestation for Trusted Computing Platform 被引量:3
2
作者 HAO Liming SUN Xun YANG Shutang LU Songnian 《Wuhan University Journal of Natural Sciences》 CAS 2007年第1期101-104,共4页
Trusted computing (TC) technology is brought out by trusted computing group (TCG) to make computing as safe and reliable as people expect. Attestation is one main function specified by TCG, which is the means by w... Trusted computing (TC) technology is brought out by trusted computing group (TCG) to make computing as safe and reliable as people expect. Attestation is one main function specified by TCG, which is the means by which a trusted computer assures a remote computer whose platform is not tampered with. There are two protocols that implement attestation without disclosing the platform's real identity, which are Privacy CA-based protocol and direct anonymous attestation (DAA) protocol. However, in the first protocol the privacy CA is the bottleneck and the platform's identity will be disclosed if the privacy CA is compromise, while DAA protocol can do profiling when dealing with rogue hardware device. In this paper, we propose a DAA-extended new approach to ensure full anonymous attestation that can not only detect a rogue TPM, but also reveal rogue TPM's real identity. 展开更多
关键词 trusted computing trusted platform module direct anonymous attestation
在线阅读 下载PDF
A Novel Direct Anonymous Attestation Protocol Based on Zero Knowledge Proof for Different Trusted Domains 被引量:3
3
作者 YANG Yatao CAO Lulin LI Zichen 《China Communications》 SCIE CSCD 2010年第4期172-175,共4页
In order to solve the issue that existing direct anonymous attestation (DAA) scheme can not operate effectively in different domains,based on the original DAA scheme,a novel direct anonymous attestation protocol used ... In order to solve the issue that existing direct anonymous attestation (DAA) scheme can not operate effectively in different domains,based on the original DAA scheme,a novel direct anonymous attestation protocol used in multi domains environment is proposed and designed,in which,the certificate issuer located in outside of domain can be considered as a proxy server to issue the DAA certificate for valid member nodes directly.Our designed mechanism accords with present trusted computing group (TCG) international specification,and can solve the problems of practical authentication and privacy information protection between different trusted domains efficiently.Compared with present DAA scheme,in our protocol,the anonymity,unforgeability can be guaranteed,and the replay-attack also can be avoided.It has important referenced and practical application value in trusted computing field. 展开更多
关键词 Network Security Trusted Computing Direct Anonymous attestation Trusted Domain.
在线阅读 下载PDF
A Trusted Attestation Mechanism for the Sensing Nodes of Internet of Things Based on Dynamic Trusted Measurement 被引量:10
4
作者 Bei Gong Yubo Wang +2 位作者 Xiangang Liu Fazhi Qi Zhihui Sun 《China Communications》 SCIE CSCD 2018年第2期100-121,共22页
Internet of things has been widely applied to industrial control, smart city and environmental protection, in these applica- tion scenarios, sensing node needs to make real-time response to the feedback control of the... Internet of things has been widely applied to industrial control, smart city and environmental protection, in these applica- tion scenarios, sensing node needs to make real-time response to the feedback control of the application layer. Therefore, it is nec- essary to monitor whether or not awareness nodes are trusted in real time, but the existing mechanisms for trusted certification lack the real-time measurement and tracking of the sensing node. To solve the above problems, this paper proposes a dynamic metric based authentication mechanism for sensing nodes of Internet of things. Firstly, the dynamic trustworthiness measure of the sensing nodes is carried out by introducing the computational function such as the trust function, the trust- worthiness risk assessment function, the feed- back control function and the active function of the sensing node. The dynamic trustworthi- ness measure of sensing nodes from multiple dimensions can effectively describe the change of trusted value of sensing nodes. Then, on the basis of this, a trusted attestation based on node trusted measure is realized by using the revocable group signature mechanism of local verifier. The mechanism has anonymity, un- forgeability and traceability, which is proved the security in the standard model. Simulationexperiments show that the proposed trusted attestation mechanism is flexible, practical and ef|Scient and has better attack resistance. It can effectively guarantee the reliable data transmission of nodes and realize the dynamic tracking of node reliability, which has a lower impact on system performance. 展开更多
关键词 internet of things: trusted mea-surement trusted attestation: group signature
在线阅读 下载PDF
An Enhanced Direct Anonymous Attestation Scheme with Mutual Authentication for Network-Connected UAV Communication Systems 被引量:3
5
作者 Liquan Chen Sijie Qian +1 位作者 Ming Lim Shihui Wang 《China Communications》 SCIE CSCD 2018年第5期61-76,共16页
In network-connected UAV(NCUAV) communication systems, user authentication is replaced by platform identity authentication and integrity check because many NC-UAVs are operated without human intervention. Direct anony... In network-connected UAV(NCUAV) communication systems, user authentication is replaced by platform identity authentication and integrity check because many NC-UAVs are operated without human intervention. Direct anonymous attestation(DAA) is an attractive cryptographic scheme that provides an elegant balance between platform authentication and anonymity. However, because of the low-level computing capability and limited transmission bandwidth in UAV, the existing DAA schemes are not suitable for NC-UAV communication systems. In this paper, we propose an enhanced DAA scheme with mutual authentication(MA-DAA scheme), which meets the security requirements of NC-UAV communication systems. The proposed MA-DAA scheme, which is based on asymmetric pairings, bundles the identities of trusted platform module(TPM) and Host to solve the malicious module changing attacks. Credential randomization, batch proof and verification, and mutual authentication are realized in the MA-DAA scheme. The computational workload in TPM and Host is reduced in order to meet the low computation and resource requirements in TPM and Host.The entire scheme and protocols are presented,and the security and efficiency of the proposed MA-DAA scheme are proved and analyzed.Our experiment results also confirm the high efficiency of the proposed scheme. 展开更多
关键词 network-connected UAV trusted computing direct anonymous attestation mutual authentication trusted platform module
在线阅读 下载PDF
A New Process and Framework for Direct Anonymous Attestation Based on Symmetric Bilinear Maps 被引量:1
6
作者 TAN Liang1,2, ZHOU Mingtian3 1. College of Computer/Key Lab of Visualization in Scientific Computing and Virtual Reality of Sichuan, Sichuan Normal University, Chengdu 610066, Sichuan, China 2. Institute of Computing Technology, Chinese Academy of Sciences, Beijing 100190, China 3. School of Computer Science and Engineering, University of Electronic Science and Technology of China, Chengdu 610054, Sichuan, China 《Wuhan University Journal of Natural Sciences》 CAS 2011年第5期369-375,共7页
For the problem of the original direct anonymous attestation (DAA) scheme's complexity and great time consumption, a new DAA scheme based on symmetric bilinear pairings is presented, which gives a practical solutio... For the problem of the original direct anonymous attestation (DAA) scheme's complexity and great time consumption, a new DAA scheme based on symmetric bilinear pairings is presented, which gives a practical solution to ECC-based TPM in protecting the privacy of the TPM. The scheme still includes five procedures or algorithms: Setup, Join, Sign, Verify and Rogue tagging, but gets rid of zero-knowledge proof and takes on a new process and framework, of which the main operations are addition, scalar multiplication and bilinear maps on supersingular elliptic curve systems. Moreover, the scheme adequately utilizes the properties of bilinear maps as well as the signature and verification of the ecliptic curve system itself. Compared with other schemes, the new DAA scheme not only satis- fies the same properties, and shows better simplicity and high effi- ciency. This paper gives not only a detailed security proof of the proposed scheme, but also a careful performance analysis by comparing with the existing DAA schemes. 展开更多
关键词 direct anonymous attestation bilinear map PRIVACY AUTHENTICATION trusted computing platform trusted platform module
原文传递
Towards a Source-Code Oriented Attestation 被引量:1
7
作者 Ruan Anbang Shen Qingni +3 位作者 Wang Li Qin Chao Gu Liang Chen Zhong 《China Communications》 SCIE CSCD 2009年第4期82-87,共6页
The Binary-based attestation(BA)mechanism presented by the Trusted Computing Group can equip the application with the capability of genuinely identifying configurations of remote system.However,BA only supports the at... The Binary-based attestation(BA)mechanism presented by the Trusted Computing Group can equip the application with the capability of genuinely identifying configurations of remote system.However,BA only supports the attestation for specific patterns of binary codes defined by a trusted party,mostly the software vendor,for a particular version of a software.In this paper,we present a Source-Code Oriented Attestation(SCOA)framework to enable custom built application to be attested to in the TCG attestation architecture.In SCOA,security attributes are bond with the source codes of an application instead of its binaries codes.With a proof chain generated by a Trusted Building System to record the building procedure,the challengers can determine whether the binary interacted with is genuinely built from a particular set of source codes.Moreover,with the security attribute certificates assigned to the source codes,they can determine the trustworthiness of the binary.In this paper,we present a TBS implementation with virtualization. 展开更多
关键词 remote attestation trusted building system VIRTUALIZATION source-code
在线阅读 下载PDF
Trust Attestation Mechanism for the Sensing Layer Nodes of Internet of Things 被引量:1
8
作者 WANG Yubo GONG Bei 《Wuhan University Journal of Natural Sciences》 CAS CSCD 2017年第4期337-345,共9页
The main function of Internet of Things is to collect and transmit data.At present,the data transmission in Internet of Things lacks effective trust attestation mechanism and trust traceability mechanism of data sourc... The main function of Internet of Things is to collect and transmit data.At present,the data transmission in Internet of Things lacks effective trust attestation mechanism and trust traceability mechanism of data source.To solve the above problems,a trust attestation mechanism for sensing layer nodes is presented.First a trusted group is established,and the node which is going to join the group needs to attest its identity and key attributes to the higher level node.Then the dynamic trust measurement value of the node can be obtained by measuring the node data transmission behavior.Finally the node encapsulates the key attributes and trust measurement value to use short message group signature to attest its trust to the challenger.This mechanism can measure the data sending and receiving behaviors of sensing nodes and track the data source,and it does not expose the privacy information of nodes and the sensing nodes can be traced effectively.The trust measurement for sensing nodes and verification is applicable to Internet of Things and the simulation experiment shows the trust attestation mechanism is flexible,practical and efficient.Besides,it can accurately and quickly identify the malicious nodes at the same time.The impact on the system performance is negligible. 展开更多
关键词 Internet of Things source of data trust measurement trust attestation
原文传递
Remote Attestation-Based Access Control on Trusted Computing Platform
9
作者 LIU Xian'gang ZHANG Xing FU Yingfang SHEN Changxiang 《Wuhan University Journal of Natural Sciences》 CAS 2010年第3期190-194,共5页
Existing remote attestation schemes based on trusted computing have some merits on enhancing security assurance level, but they usually do not integrate tightly with the classical system security mechanism. In this pa... Existing remote attestation schemes based on trusted computing have some merits on enhancing security assurance level, but they usually do not integrate tightly with the classical system security mechanism. In this paper, we present a component named remote attestation-based access controller (RABAC), which is based on a combination of techniques, such as random number, Bell-La Padula (BLP) model, user identity combined with his security properties and so on. The component can validate the current hardware and software integrity of the remote platform, and implement access control with different security policy. We prove that the RABAC can not only improve the security of transferred information in remote attestation process but also integrate remote attestation and classical system security mechanism effectively. 展开更多
关键词 trusted computing remote attestation access control security model
原文传递
SAPEM: Secure Attestation of Program Execution and Program Memory for IoT Applications
10
作者 Nasa Ahmed Manar Abu Talib Qassim Nasir 《Computers, Materials & Continua》 SCIE EI 2021年第4期23-49,共27页
Security is one of the major challenges that devices connected to the Internet of Things(IoT)face today.Remote attestation is used to measure these devices’trustworthiness on the network by measuring the device platf... Security is one of the major challenges that devices connected to the Internet of Things(IoT)face today.Remote attestation is used to measure these devices’trustworthiness on the network by measuring the device platform’s integrity.Several software-based attestation mechanisms have been proposed,but none of them can detect runtime attacks.Although some researchers have attempted to tackle these attacks,the proposed techniques require additional secured hardware parts to be integrated with the attested devices to achieve their aim.These solutions are expensive and not suitable in many cases.This paper proposes a dual attestation process,SAPEM,with two phases:static and dynamic.The static attestation phase examines the program memory of the attested device.The dynamic program ow attestation examines the execution correctness of the application code.It can detect code injection and runtime attacks that hijack the control-ow,including data attacks that affect the program control-ow.The main aim is to minimize attestation overhead while maintaining our ability to detect the specied attacks.We validated SAPEM by implementing it on Raspberry Pi using its TrustZone extension.We attested it against the specied attacks and compared its performance with the related work in the literature.The results show that SAPEM signicantly minimizes performance overhead while reliably detecting runtime attacks at the binary level. 展开更多
关键词 IOT remote attestation runtime attacks TRUST TRUSTZONE security
在线阅读 下载PDF
Efficient Property-Based Remote Attestation Scheme
11
作者 Zhang Yichen Li Jiguo Sun Chuanming 《China Communications》 SCIE CSCD 2012年第10期1-9,共9页
In order to ensure the security of the property-based remote attestation scheme, an improved, more efficient, forrml security model of property-based remote attestation is proposed, with which we prove that the user p... In order to ensure the security of the property-based remote attestation scheme, an improved, more efficient, forrml security model of property-based remote attestation is proposed, with which we prove that the user platform satis- fies the security property requirements predefmed by a remote relying party. Under the co-Corrtautational Diffie-Helknan (CDH) assumption, the proposed scheme is proved to be secure in the random oracle model. Compared with the existing schemes, the proposed scheme has a short property certificate and signature size, and requires less computational cost. 展开更多
关键词 trusted computing remote attestation PAIRING co-CDH assumption
在线阅读 下载PDF
TVRAVNF: an efficient low‑cost TEE‑based virtual remote attestation scheme for virtual network functions
12
作者 Jie Yuan Rui Xu +2 位作者 Xinghai Wei Keji Miao Dongxiao Liu 《Cybersecurity》 2025年第3期215-226,共12页
With the continuous advancement of virtualization technology and the widespread adoption of 5G networks,the application of the Network Function Virtualization (NFV) architecture has become increasingly popular and pre... With the continuous advancement of virtualization technology and the widespread adoption of 5G networks,the application of the Network Function Virtualization (NFV) architecture has become increasingly popular and prevalent.While the NFV architecture brings a lot of advantages, it also introduces security challenges, including the effectiveand efficient verification of the integrity of deployed Virtual Network Functions (VNFs) and ensuring the secureoperation of VNFs. To address the challenge of efficiently conducting virtual remote attestation for VNFs and establishingtrust in virtualized environments like NFV architecture, we propose TVRAVNF, which is a highly efficientand low-cost TEE-based virtual remote attestation scheme for VNFs. The scheme we proposed ensures the securityand effectiveness of the virtual remote attestation process by leveraging TEE. Furthermore, we introduces a novellocal attestation mechanism, which not only reduces the overall overhead of the virtual remote attestation processbut also shortens the attestation interval to mitigate Time-Of-Check-Time-Of-Use attacks, thereby enhancing overallsecurity. We conduct experiments to validate the overhead of the TVRAVNF scheme and compare its performancewith that of a typical remote attestation process within a maximum unattested time interval. The experimental resultsdemonstrate that, by employing the local attestation mechanism, our solution achieves nearly an 80% significantperformance improvement with a relatively small time overhead for small to medium-sized files. This further substantiatesthe significant advantages of our approach in both security and efficiency. 展开更多
关键词 Virtual remote attestation NFV TEE Virtualization security
原文传递
基于eBPF的容器运行时可信监控方案 被引量:1
13
作者 黄轲 李璇 +2 位作者 周庆飞 尚科彤 秦宇 《信息网络安全》 北大核心 2025年第2期306-326,共21页
随着云服务技术的发展,越来越多的应用以容器形式迁移到云端,容器的安全监控成为研究热点。虽然容器具有轻量级、部署快速、移植便捷的优点,但其较弱的隔离性却带来了诸多安全问题,如容器逃逸攻击、容器镜像投毒、内核漏洞利用等。针对... 随着云服务技术的发展,越来越多的应用以容器形式迁移到云端,容器的安全监控成为研究热点。虽然容器具有轻量级、部署快速、移植便捷的优点,但其较弱的隔离性却带来了诸多安全问题,如容器逃逸攻击、容器镜像投毒、内核漏洞利用等。针对这些威胁,文章采用eBPF系统监控技术,结合BMC信任根、镜像静态分析、通用策略引擎及运行时证明,提出了一种容器运行时安全监控方案。该方案利用eBPF实现的监控程序,能够识别并监控容器的进程、权能、文件、网络等行为事件。同时,该方案设计了细粒度的容器安全策略,并依据容器镜像静态分析所得的系统调用白名单,检测容器异常行为,多维度保障容器安全。此外,该方案还设计并实现了基于BMC信任根的运行时证明协议,利用BMC中集成的可信计算模块作为信任根,通过可信计算模块的证明确保eBPF监控事件报警日志的完整性和真实性。实验表明,监控服务器能够长期监控各类容器的运行状态,并针对安全异常事件及时采取应对措施。 展开更多
关键词 容器安全 eBPF 运行时监控 BMC信任根 远程证明
在线阅读 下载PDF
区块链在BGP路由泄露防护中的应用研究
14
作者 王群 李馥娟 马卓 《计算机工程》 北大核心 2025年第8期39-52,共14页
组成边界网关协议(BGP)的自治系统(AS)之间存在不同的利益关系和路由策略,当实际的路由宣告超出预期范围时,可能产生路由泄露,从而导致因路由重定向引起的网络安全事件。然而,在BGP路由信息传播过程中,AS会无条件信任和接受邻居AS对外... 组成边界网关协议(BGP)的自治系统(AS)之间存在不同的利益关系和路由策略,当实际的路由宣告超出预期范围时,可能产生路由泄露,从而导致因路由重定向引起的网络安全事件。然而,在BGP路由信息传播过程中,AS会无条件信任和接受邻居AS对外宣告的路由,而每个AS自主配置本地策略且信息保密,增加了路由策略验证的难度,成为BGP安全领域一直备受关注且尚未有效解决的难题。区块链以其独有的去中心化、可溯源、防篡改、开放透明等特征,可为AS间的数字资源认证与信任建立提供基础设施保障,有望成为应对路由泄露威胁的关键技术。首先,界定了邻居AS之间以及GR(Gao-Rexford)模型与BGP路由策略之间的关系,明确了导致路由泄露的根源和防御挑战;然后,梳理了针对路由泄露的传统解决方案的研究脉络,重点分析了其优缺点以及尚未解决的问题;接着,提出了区块链技术在BGP路由泄露防护中的优势及技术思路,探讨了典型解决方案的实现原理和应用特点;最后,在阐述存在问题和挑战的基础上,对下一步研究进行了展望。 展开更多
关键词 区块链 域间路由安全 路由源认证 路由泄露 IP地址前缀
在线阅读 下载PDF
Trusted Attestation Architecture on an Infrastructure-as-a-Service 被引量:4
15
作者 Xin Jin Xingshu Chen +1 位作者 Cheng Zhao Dandan Zhao 《Tsinghua Science and Technology》 SCIE EI CAS CSCD 2017年第5期469-477,共9页
Trusted attestation is the main obstruction preventing large-scale promotion of cloud computing. How to extend a trusted relationship from a single physical node to an Infrastructure-as-a-Service (laaS) platform is ... Trusted attestation is the main obstruction preventing large-scale promotion of cloud computing. How to extend a trusted relationship from a single physical node to an Infrastructure-as-a-Service (laaS) platform is a problem that must be solved. The laaS platform provides the Virtual Machine (VM), and the Trusted VM, equipped with a virtual Trusted Platform Module (vTPM), is the foundation of the trusted laaS platform. We propose a multi-dimensional trusted attestation architecture that can collect and verify trusted attestation information from the computing nodes, and manage the information centrally on a cloud management platform. The architecture verifies the laaS's trusted attestation by apprising the VM, Hypervisor, and host Operating System's (OS) trusted status. The theory and the technology roadmap were introduced, and the key technologies were analyzed. The key technologies include dynamic measurement of the Hypervisor at the process level, the protection of vTPM instances, the reinforcement of Hypervisor security, and the verification of the laaS trusted attestation. A prototype was deployed to verify the feasibility of the system. The advantages of the prototype system were compared with the Open CIT (Intel Cloud attestation solution). A performance analysis experiment was performed on computing nodes and the results show that the performance loss is within an acceptable range. 展开更多
关键词 dynamic measurement trusted cloud vTPM trusted attestation
原文传递
TPM-Based Remote Attestation for Wireless Sensor Networks 被引量:4
16
作者 Donglai Fu Xinguang Peng 《Tsinghua Science and Technology》 SCIE EI CAS CSCD 2016年第3期312-321,共10页
It is essential to design a protocol to allow sensor nodes to attest to their trustworthiness for mission- critical applications based on Wireless Sensor Networks (WSNs). However, it is a challenge to evaluate the t... It is essential to design a protocol to allow sensor nodes to attest to their trustworthiness for mission- critical applications based on Wireless Sensor Networks (WSNs). However, it is a challenge to evaluate the trustworthiness without appropriate hardware support. Hence, we present a hardware-based remote attestation protocol to tackle the problem within WSNs. In our design, each sensor node is equipped with a Trusted Platform Module (TPM) which plays the role of a trusted anchor. We start with the formulation of remote attestation and its security. The complete protocol for both single-hop and multi-hop attestations is then demonstrated. Results show the new protocol is effective, efficient, and secure. 展开更多
关键词 network security wireless sensor networks remote attestation trusted platform module
原文传递
Voluntary disclosure of internal control and auditor's attestation: evidence from China
17
作者 Fang Lou Qian Sun Hongqi Yuan 《Frontiers of Business Research in China》 2017年第2期208-241,共34页
We examine what determines a firm's decision to disclose a self-assessment report on its internal control (IC) system and to further attain an auditor's attestation on the report, using a sample of firms from the ... We examine what determines a firm's decision to disclose a self-assessment report on its internal control (IC) system and to further attain an auditor's attestation on the report, using a sample of firms from the Shanghai Stock Exchange during the period 2006-2010. We hypothesize and find supporting evidence that the likelihood of having voluntary disclosure of IC self-assessment with an auditor's attestation is positively related to future equity refinancing, mutuM-fund shareholding, and whether the firm is controlled by the government, especially the central government. Our study also takes the identification problem into consideration, as our sample includes firms with IC weaknesses/deficiencies. Our study not only makes an incremental contribution to the literature, but also has practical implications, especially for regulators and investors in China. 展开更多
关键词 Internal control Voluntary disclosure Auditor's attestation SELF-ASSESSMENT
原文传递
Artifacts Attest to the Glorious Ancient Culture of Hunan Province
18
作者 JANE SHAW 《Women of China》 1995年第1期45-46,共2页
HUNAN is located in the middle reaches of the Yangtze River and to the south of Dongting Lake. In Chinese, hu means lake and nan, south. The Xiangjiang River valley, which flows through the province from south to nort... HUNAN is located in the middle reaches of the Yangtze River and to the south of Dongting Lake. In Chinese, hu means lake and nan, south. The Xiangjiang River valley, which flows through the province from south to north, is the most developed region in the areas of politics, the economy and culture. Thus, Hunan is also called Xiang for short. 展开更多
关键词 In Artifacts attest to the Glorious Ancient Culture of Hunan Province
原文传递
域间路由安全增强及区块链技术的应用研究 被引量:6
19
作者 王群 李馥娟 +2 位作者 倪雪莉 夏玲玲 马卓 《计算机科学与探索》 CSCD 北大核心 2024年第12期3144-3174,共31页
边界网关协议(BGP)是目前互联网中事实上的域间路由标准,其安全性建立在自治系统(AS)身份及路径真实完整基础上,但BGP自身缺乏相应的安全保障机制,其安全问题备受关注。区块链作为构建新一代信息基础设施的创新技术,支撑在开放互联网环... 边界网关协议(BGP)是目前互联网中事实上的域间路由标准,其安全性建立在自治系统(AS)身份及路径真实完整基础上,但BGP自身缺乏相应的安全保障机制,其安全问题备受关注。区块链作为构建新一代信息基础设施的创新技术,支撑在开放互联网环境中构建分布式多方信任体系,为当前传统BGP安全增强中遇到的问题和挑战提供了技术应对。根据技术发展和安全迭代,将BGP安全增强划分为3个递进阶段:以安全边界网关协议(S-BGP)为代表的理论创新阶段,以资源公钥基础设施(RPKI)为安全基础的应用实践阶段,以及基于区块链技术的创新发展阶段。分析BGP路由传播方式和路由策略的脆弱性,以及前缀劫持、路径伪造和路由泄露3类典型的安全威胁方式;梳理传统BGP安全增强技术路线和研究脉络,重点从主动防御和异常检测两个方面讨论针对错误路由宣告攻击的应对机制;在简要介绍区块链技术基本原理的基础上,利用区块链的去中心化、防篡改、可溯源、分布式部署等特性,重点探讨基于区块链的BGP安全增强技术的实现思想、路径和方法;主要结合区块链技术的应用,讨论BGP安全增强中面临的挑战,并对未来研究方向进行展望。 展开更多
关键词 边界网关协议 安全增强 区块链 资源公钥基础设施 路由认证
在线阅读 下载PDF
Enhancing the Trustworthiness of 6G Based on Trusted Multi-Cloud Infrastructure:A Practice of Cryptography Approach
20
作者 Mingxing Zhou Peng Xiao +3 位作者 Qixu Wang Shuhua Ruan Xingshu Chen Menglong Yang 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第1期957-979,共23页
Due to the need for massive device connectivity,low communication latency,and various customizations in 6G architecture,a distributed cloud deployment approach will be more relevant to the space-air-ground-sea integra... Due to the need for massive device connectivity,low communication latency,and various customizations in 6G architecture,a distributed cloud deployment approach will be more relevant to the space-air-ground-sea integrated network scenario.However,the openness and heterogeneity of the 6G network cause the problems of network security.To improve the trustworthiness of 6G networks,we propose a trusted computing-based approach for establishing trust relationships inmulti-cloud scenarios.The proposed method shows the relationship of trust based on dual-level verification.It separates the trustworthy states of multiple complex cloud units in 6G architecture into the state within and between cloud units.Firstly,SM3 algorithm establishes the chain of trust for the system’s trusted boot phase.Then,the remote attestation server(RAS)of distributed cloud units verifies the physical servers.Meanwhile,the physical servers use a ring approach to verify the cloud servers.Eventually,the centralized RAS takes one-time authentication to the critical evidence information of distributed cloud unit servers.Simultaneously,the centralized RAS also verifies the evidence of distributed RAS.We establish our proposed approach in a natural OpenStack-based cloud environment.The simulation results show that the proposed method achieves higher security with less than a 1%system performance loss. 展开更多
关键词 6G multi-cloud trusted Infrastructure remote attestation commercial cipher
在线阅读 下载PDF
上一页 1 2 31 下一页 到第
使用帮助 返回顶部