All submissions of the EM system will be redirected to Online Manuscript Submission System. Authors are requested to submit articles directly to Online Manuscript Submission System of respective journal.


Vehicle network application node security authentication based on trusted computing and direct anonymous attestation

Author(s): Ren Shuai, Zhao Xiangmo, Zhang Tao, Lou Zongzong

Security is a basic requirement for vehicle network or other networks. But there is little security strategy special for vehicle network. The existing network security strategy, which applies to fixed network very well, cannot satisfy the requirement of vehicle network. In this paper, trusted computing and direct anonymous attestation theories are adopted to establish protocol system of trusted vehicle information authentication, thus the security of authentication process for nodes in vehicle network can be improved. It is illustrated that the efficiency of verification can be increased and the possibility of being attacked can be decreased.

Share this       

Table of Contents

Recommended Conferences

International Congress on Biotechnology

Tokyo, Japan

24th Global Congress on Biotechnology

Dubai, UAE
izmir escort izmir escort bursa escort antalya escort izmir escort porno porno izle türk porno eskişehir escort bartın escort burdur escort havalandırma izmir escort bursa escort porno indir izle escort izmir