Abstract
Trusted network is a new direction of Internet research. On the basis of trusted network, this paper puts forward a trusted terminal that takes the USBKey as a trusted root and designed a trusted label that used to access authentication. Then, against the background of the trusted local area network (LAN), this paper describes the initial access authentication process and the sustainable authentication process when the trusted terminal access the trusted LAN, meanwhile, analyzes its safety performance.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Lin, C., Peng, X.H.: The research of trusted network. Chin. J. Comput. 28(5), 751–758 (2005)
Lin, C., Ren, F.Y.: Controllable, trustworthy and scalable new generation internet. J. Softw. 15(2), 1815–1821 (2004)
Wu, J., Bi, J., Li, X.: A source address validation architecture (SAVA) Tested and Deployment Experience. In: IETF Internet Standard, RFC 5210, (2008)
Liu, W., Yang, L., Dai, H., Hou, B.: A new network access control method and performance analysis of authentication session. Chin. J. Comput. 30(10), 1806–1812 (2007)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2014 Springer India
About this paper
Cite this paper
Wang, Y., Duan, Y., Wang, F. (2014). Trusted Network Access Authentication Scheme Based on the Label. In: Patnaik, S., Li, X. (eds) Proceedings of International Conference on Computer Science and Information Technology. Advances in Intelligent Systems and Computing, vol 255. Springer, New Delhi. https://doi.org/10.1007/978-81-322-1759-6_15
Download citation
DOI: https://doi.org/10.1007/978-81-322-1759-6_15
Publisher Name: Springer, New Delhi
Print ISBN: 978-81-322-1758-9
Online ISBN: 978-81-322-1759-6
eBook Packages: EngineeringEngineering (R0)