Visible to the public Design of Terminal Security Access Scheme based on Trusted Computing in Ubiquitous Electric Internet of Things

TitleDesign of Terminal Security Access Scheme based on Trusted Computing in Ubiquitous Electric Internet of Things
Publication TypeConference Paper
Year of Publication2020
AuthorsWang, Guodong, Tian, Dongbo, Gu, Fengqiang, Li, Jia, Lu, Yang
Conference Name2020 IEEE 9th Joint International Information Technology and Artificial Intelligence Conference (ITAIC)
KeywordsComputer architecture, Conferences, cryptography, human factors, information technology, Internet of Things, Metrics, Monitoring, pubcrawl, Resiliency, Scalability, secure access, terminal access, Trusted Computing, Ubiquitous Computing Security, ubiquitous electric internet of things
AbstractIn the Ubiquitous Electric Internet of Things (UEIoT), the terminals are very easy to be accessed and attacked by attackers due to the lack of effective monitoring and safe isolation methods. Therefore, in the implementation of UEIoT, the security protection of terminals is particularly important. Therefore, this paper proposes a dual-system design scheme for terminal active immunity based on trusted computing. In this scheme, the terminal node in UEIoT is composed of two parts: computing part and trusted protection part. The computing component and the trusted protection component are logically independent of each other, forming a trusted computing active immune dual-system structure with both computing and protection functions. The Trusted Network Connection extends the trusted state of the terminal to the network, thus providing a solution for terminal secure access in the UEIoT.
DOI10.1109/ITAIC49862.2020.9339022
Citation Keywang_design_2020