files/journal/2022-09-02_11-59-20-000000_418.png

Asian Journal of Information Technology

ISSN: Online 1993-5994
ISSN: Print 1682-3915
130
Views
1
Downloads

Application of Trusted Computing to the Adhoc Networks Security

Ren Shuai , Zhang Tao , Mu Dejun and Zhang Degang
Page: 370-373 | Received 21 Sep 2022, Published online: 21 Sep 2022

Full Text Reference XML File PDF File

Abstract

As Adhoc networks own characteristics, the existing fixed network security strategy can not be effectively implemented. Trusted Computing theory will be imported into Adhoc networks based on researching the Adhoc network. To optimize authentication link of the Adhoc networks, we make use of trusted computing platform module in hardware level and Direct Anonymous Attestation theory. The application effectively solves the Adhoc nodes security issues thus, raising the Adhoc network against attacks.


How to cite this article:

Ren Shuai , Zhang Tao , Mu Dejun and Zhang Degang . Application of Trusted Computing to the Adhoc Networks Security.
DOI: https://doi.org/10.36478/ajit.2008.370.373
URL: https://www.makhillpublications.co/view-article/1682-3915/ajit.2008.370.373