Research on Authentication-Based Security Technology for Complex Networks


Article Preview

The concept of authentication network is proposed to solve the security problems of complex network. The basic idea of authentication network is to ensure that everything of network must be authenticated. The technologies about authentication node, including the trusted root and trusted chain are studied. The security technologies about authentication networks, including trusted transmission, distributed and tree authentication management, multistage and multilayer access control strategy are also researched. At last, the security abilities of authentication network are analyzed.



Edited by:

Amanda Wu




Y. Li et al., "Research on Authentication-Based Security Technology for Complex Networks", Applied Mechanics and Materials, Vol. 232, pp. 701-705, 2012

Online since:

November 2012




[1] F. Y. Xiang, S. C. Xiang, H. Tao. A Solution of Computing Security in Distributed System. Computer Engineering (2006).

[2] N. C. Bing, H. Fan. The Research on Identification Authentication in Distributed Environment. Micro-Computer and Application (2005).

[3] S. L. Kinney. Trusted Platform Module Basics: using TPM in Embedded Systems. Newnes (2006).

[4] Y. Li, L. J. Zhao, D. Liu. A Systematic Defense Model for Complex Network Based on Authentication, ICMCE (2011).

[5] H. G. Zhang, L. Chen, L. Q. ZHANG. Research on Trusted Network Link. Computer Journal (2010).