Models of Trust and Trusted Computations to an Ad-hoc Network Security

Authors

  • Younis Samir Younis Ministry of Education, Nineveh Education Directorate, Nineveh, Iraq
  • Saad Hussein Abed Hamed College of Computer Science & Information Technology, Al-Qadisiyah University, Al-Diwaniyah,Iraq
  • Saleem Meften Department of Computer Science and Engineering, Hodeidah University, Al-Hudaydah, Yemen

DOI:

https://doi.org/10.29304/jqcm.2022.14.4.1090

Keywords:

Ad-hoc network, trust computations, trusted computations Network, Cloud computing

Abstract

Ad-hoc networks have unique properties, making it impossible to execute the current existing network security policy successfully. Based on studying the Ad-hoc network, the Cloud Security theory will be applied to it. We apply Direct Blind Authentication theory and trusted computing platform hardware modules to optimize the Ad-hoc networks' authentication links. The program successfully addresses the security concerns of Ad-hoc nodes, strengthening the Ad-hoc network's defenses.

Downloads

Download data is not yet available.

References

1) Brickell, E., J. Camenisch and L. Chen, 2004. Direct anonymous attestation. Proc. 11th ACM Conf. Compu. Commun. Security, pp: 132-145.
2) Camenisch, J. and A. Lysyanskaya, 2003. A Signature Scheme with Efficient Protocols. Security in Communication Networks: Third International Conference, SCN 2002, pp: 268-270.
3) Liming, H., X. Sun, Y. Shutang and L. Songnian, 2007. A Method to Implement Full Anonymous Attestation for Trusted Computing Platform. Wuhan Uni. J. Nat. Sci., pp: 101-104.
4) Nützel, J. and A. Beyer, 2006. How to Increase the Security of Digital Rights Management Systems without Affecting Consumer's Security. Emerging Trends in Info. Commun. Security, pp: 368-380.
5) Ping, Y., J. Yichuan, Z. Shiyong and Z. Yiping, 2005. A Survey of Security for Mobile Ad-hoc Networks. Acta Electronica Sinica, pp: 893-899.
6) Tingyao, J., Y. Jinghua and L. Qinghua, 2005. Survey on the Security for Mobile Ad-hoc Networks. Appl. Res. Com., pp: 1-4.
7) Sumrall, Nancy, and Manny Novoa. "Trusted computing group (TCG) and the TPM 1.2 specification." In Intel Developer Forum, vol. 32. Intel, 2003.
8) Zhidong, S., Z. Huanguo, Z. Miao, Y. Fei and Z. Liqiang, 2006. The Mechanism about Key and Credential on Trusted Computing Platform and the Application Study. Wuhan Uni. J. Nat. Sci., pp: 1641-1644.

Downloads

Published

2022-12-02

How to Cite

Younis, Y. S., Abed Hamed, S. H., & Meften, S. (2022). Models of Trust and Trusted Computations to an Ad-hoc Network Security. Journal of Al-Qadisiyah for Computer Science and Mathematics, 14(4), Comp Page 92–100. https://doi.org/10.29304/jqcm.2022.14.4.1090

Issue

Section

Computer Articles

Most read articles by the same author(s)

<< < 1 2 3