TY - JOUR T1 - Application of Trusted Computing to the Adhoc Networks Security AU - , Ren Shuai AU - , Zhang Tao AU - , Mu Dejun AU - , Zhang Degang JO - Asian Journal of Information Technology VL - 7 IS - 8 SP - 370 EP - 373 PY - 2008 DA - 2001/08/19 SN - 1682-3915 DO - ajit.2008.370.373 UR - https://makhillpublications.co/view-article.php?doi=ajit.2008.370.373 KW - Network security KW -Adhoc network KW -trusted computing KW -zero-knowledge proof AB - As Adhoc networks own characteristics, the existing fixed network security strategy can not be effectively implemented. Trusted Computing theory will be imported into Adhoc networks based on researching the Adhoc network. To optimize authentication link of the Adhoc networks, we make use of trusted computing platform module in hardware level and Direct Anonymous Attestation theory. The application effectively solves the Adhoc nodes security issues thus, raising the Adhoc network against attacks. ER -