Title | Design of Terminal Security Access Scheme based on Trusted Computing in Ubiquitous Electric Internet of Things |
Publication Type | Conference Paper |
Year of Publication | 2020 |
Authors | Wang, Guodong, Tian, Dongbo, Gu, Fengqiang, Li, Jia, Lu, Yang |
Conference Name | 2020 IEEE 9th Joint International Information Technology and Artificial Intelligence Conference (ITAIC) |
Keywords | Computer architecture, Conferences, cryptography, human factors, information technology, Internet of Things, Metrics, Monitoring, pubcrawl, Resiliency, Scalability, secure access, terminal access, Trusted Computing, Ubiquitous Computing Security, ubiquitous electric internet of things |
Abstract | In the Ubiquitous Electric Internet of Things (UEIoT), the terminals are very easy to be accessed and attacked by attackers due to the lack of effective monitoring and safe isolation methods. Therefore, in the implementation of UEIoT, the security protection of terminals is particularly important. Therefore, this paper proposes a dual-system design scheme for terminal active immunity based on trusted computing. In this scheme, the terminal node in UEIoT is composed of two parts: computing part and trusted protection part. The computing component and the trusted protection component are logically independent of each other, forming a trusted computing active immune dual-system structure with both computing and protection functions. The Trusted Network Connection extends the trusted state of the terminal to the network, thus providing a solution for terminal secure access in the UEIoT. |
DOI | 10.1109/ITAIC49862.2020.9339022 |
Citation Key | wang_design_2020 |