Asian Journal of Information Technology

Year: 2008
Volume: 7
Issue: 8
Page No. 370 - 373

Application of Trusted Computing to the Adhoc Networks Security

Authors : Ren Shuai , Zhang Tao , Mu Dejun and Zhang Degang

Abstract: As Adhoc networks own characteristics, the existing fixed network security strategy can not be effectively implemented. Trusted Computing theory will be imported into Adhoc networks based on researching the Adhoc network. To optimize authentication link of the Adhoc networks, we make use of trusted computing platform module in hardware level and Direct Anonymous Attestation theory. The application effectively solves the Adhoc nodes security issues thus, raising the Adhoc network against attacks.

How to cite this article:

Ren Shuai , Zhang Tao , Mu Dejun and Zhang Degang , 2008. Application of Trusted Computing to the Adhoc Networks Security. Asian Journal of Information Technology, 7: 370-373.

Design and power by Medwell Web Development Team. © Medwell Publishing 2024 All Rights Reserved