Design and validation for a remote attestation security protocol

By analyzing current remote attestation model, an improved remote attestation model was provided and de-signed.In order to verify whether it conforms to security requirement, a formal analysis method CSP was used to analyze the protocol and model it with CSP method.Meanwhile, it was checked with FDR...

Full description

Saved in:
Bibliographic Details
Main Authors: WANG Dan, WEI Jin-feng, ZHOU Xiao-dong
Format: Article
Language:zho
Published: Editorial Department of Journal on Communications 2009-01-01
Series:Tongxin xuebao
Subjects:
Online Access:http://www.joconline.com.cn/zh/article/74649196/
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1841537691801354240
author WANG Dan
WEI Jin-feng
ZHOU Xiao-dong
author_facet WANG Dan
WEI Jin-feng
ZHOU Xiao-dong
author_sort WANG Dan
collection DOAJ
description By analyzing current remote attestation model, an improved remote attestation model was provided and de-signed.In order to verify whether it conforms to security requirement, a formal analysis method CSP was used to analyze the protocol and model it with CSP method.Meanwhile, it was checked with FDR tool.A loophole of the protocol was found.For solving the problem, an improvement to the protocol was made.It has been verified that security properties can be guaranteed by the re-validate.This protocol can be used for the remote attestation in trust computing and it can ensure the secrecy, integrity, authentication and freshmen in the interoperation process of the protocol.
format Article
id doaj-art-ba1fb3f6864e457e93a5f209fffb0b23
institution Kabale University
issn 1000-436X
language zho
publishDate 2009-01-01
publisher Editorial Department of Journal on Communications
record_format Article
series Tongxin xuebao
spelling doaj-art-ba1fb3f6864e457e93a5f209fffb0b232025-01-14T08:27:04ZzhoEditorial Department of Journal on CommunicationsTongxin xuebao1000-436X2009-01-0130293674649196Design and validation for a remote attestation security protocolWANG DanWEI Jin-fengZHOU Xiao-dongBy analyzing current remote attestation model, an improved remote attestation model was provided and de-signed.In order to verify whether it conforms to security requirement, a formal analysis method CSP was used to analyze the protocol and model it with CSP method.Meanwhile, it was checked with FDR tool.A loophole of the protocol was found.For solving the problem, an improvement to the protocol was made.It has been verified that security properties can be guaranteed by the re-validate.This protocol can be used for the remote attestation in trust computing and it can ensure the secrecy, integrity, authentication and freshmen in the interoperation process of the protocol.http://www.joconline.com.cn/zh/article/74649196/trusted computingremote attestationsecurity protocolCSP
spellingShingle WANG Dan
WEI Jin-feng
ZHOU Xiao-dong
Design and validation for a remote attestation security protocol
Tongxin xuebao
trusted computing
remote attestation
security protocol
CSP
title Design and validation for a remote attestation security protocol
title_full Design and validation for a remote attestation security protocol
title_fullStr Design and validation for a remote attestation security protocol
title_full_unstemmed Design and validation for a remote attestation security protocol
title_short Design and validation for a remote attestation security protocol
title_sort design and validation for a remote attestation security protocol
topic trusted computing
remote attestation
security protocol
CSP
url http://www.joconline.com.cn/zh/article/74649196/
work_keys_str_mv AT wangdan designandvalidationforaremoteattestationsecurityprotocol
AT weijinfeng designandvalidationforaremoteattestationsecurityprotocol
AT zhouxiaodong designandvalidationforaremoteattestationsecurityprotocol