Design and validation for a remote attestation security protocol
By analyzing current remote attestation model, an improved remote attestation model was provided and de-signed.In order to verify whether it conforms to security requirement, a formal analysis method CSP was used to analyze the protocol and model it with CSP method.Meanwhile, it was checked with FDR...
Saved in:
Main Authors: | , , |
---|---|
Format: | Article |
Language: | zho |
Published: |
Editorial Department of Journal on Communications
2009-01-01
|
Series: | Tongxin xuebao |
Subjects: | |
Online Access: | http://www.joconline.com.cn/zh/article/74649196/ |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
_version_ | 1841537691801354240 |
---|---|
author | WANG Dan WEI Jin-feng ZHOU Xiao-dong |
author_facet | WANG Dan WEI Jin-feng ZHOU Xiao-dong |
author_sort | WANG Dan |
collection | DOAJ |
description | By analyzing current remote attestation model, an improved remote attestation model was provided and de-signed.In order to verify whether it conforms to security requirement, a formal analysis method CSP was used to analyze the protocol and model it with CSP method.Meanwhile, it was checked with FDR tool.A loophole of the protocol was found.For solving the problem, an improvement to the protocol was made.It has been verified that security properties can be guaranteed by the re-validate.This protocol can be used for the remote attestation in trust computing and it can ensure the secrecy, integrity, authentication and freshmen in the interoperation process of the protocol. |
format | Article |
id | doaj-art-ba1fb3f6864e457e93a5f209fffb0b23 |
institution | Kabale University |
issn | 1000-436X |
language | zho |
publishDate | 2009-01-01 |
publisher | Editorial Department of Journal on Communications |
record_format | Article |
series | Tongxin xuebao |
spelling | doaj-art-ba1fb3f6864e457e93a5f209fffb0b232025-01-14T08:27:04ZzhoEditorial Department of Journal on CommunicationsTongxin xuebao1000-436X2009-01-0130293674649196Design and validation for a remote attestation security protocolWANG DanWEI Jin-fengZHOU Xiao-dongBy analyzing current remote attestation model, an improved remote attestation model was provided and de-signed.In order to verify whether it conforms to security requirement, a formal analysis method CSP was used to analyze the protocol and model it with CSP method.Meanwhile, it was checked with FDR tool.A loophole of the protocol was found.For solving the problem, an improvement to the protocol was made.It has been verified that security properties can be guaranteed by the re-validate.This protocol can be used for the remote attestation in trust computing and it can ensure the secrecy, integrity, authentication and freshmen in the interoperation process of the protocol.http://www.joconline.com.cn/zh/article/74649196/trusted computingremote attestationsecurity protocolCSP |
spellingShingle | WANG Dan WEI Jin-feng ZHOU Xiao-dong Design and validation for a remote attestation security protocol Tongxin xuebao trusted computing remote attestation security protocol CSP |
title | Design and validation for a remote attestation security protocol |
title_full | Design and validation for a remote attestation security protocol |
title_fullStr | Design and validation for a remote attestation security protocol |
title_full_unstemmed | Design and validation for a remote attestation security protocol |
title_short | Design and validation for a remote attestation security protocol |
title_sort | design and validation for a remote attestation security protocol |
topic | trusted computing remote attestation security protocol CSP |
url | http://www.joconline.com.cn/zh/article/74649196/ |
work_keys_str_mv | AT wangdan designandvalidationforaremoteattestationsecurityprotocol AT weijinfeng designandvalidationforaremoteattestationsecurityprotocol AT zhouxiaodong designandvalidationforaremoteattestationsecurityprotocol |