HOME JOURNALS CONTACT

Asian Journal of Information Technology

Application of Trusted Computing to the Adhoc Networks Security
Ren Shuai , Zhang Tao , Mu Dejun and Zhang Degang

Abstract: As Adhoc networks own characteristics, the existing fixed network security strategy can not be effectively implemented. Trusted Computing theory will be imported into Adhoc networks based on researching the Adhoc network. To optimize authentication link of the Adhoc networks, we make use of trusted computing platform module in hardware level and Direct Anonymous Attestation theory. The application effectively solves the Adhoc nodes security issues thus, raising the Adhoc network against attacks.

How to cite this article
Ren Shuai , Zhang Tao , Mu Dejun and Zhang Degang , 2008. Application of Trusted Computing to the Adhoc Networks Security. Asian Journal of Information Technology, 7: 370-373.

© Medwell Journals. All Rights Reserved