Trusted Network Connect of Trusted Computing Group (TCG) With 802.1x Port based Authentication

Best Essays
Abstract— Trusted Computing Group (TCG) is providing a great effort to provide network security at every level, that’s why the technologies of trusted computing group are spreading very rapidly and will become the most leading technologies in next few years. Always there are Threats to networks, which create need for some features to secure the network at end point admission. The flow of information must be confident and data integrity measures should also be followed. The models provided by trusted computing group provides high and powerful security features, TNC: Trusted Network Connect is a technology provided by TCG, which provides security both at hardware and software platforms. TNC is basically used for NAC (Authentication Purpose). The Architecture of NAC provides a clear background of how a network can be made secure and how to avoid unauthorized access. IEEE 802.1x is a standard which provide port based network access control and protect the network from unauthorized access. If the access register is unauthorized then access is given but access is not given when the access is unauthorized. IEEE 802.1x is basically used for authentication and authorization purpose. This paper aims to review the literature of trusted computing in context of trusted network connect and 802.1x port based authentication using NAC.

Keywords- Trusted network connect; 802.1x; Network access control; Security mechanisms; EAP


Security is often seen as exclusive requirement in networking, providing security is an important issue. A lot of problems are there so a lot of security measures should be provided. Security is more important than ever before due to many reasons. When a network is implemented poorly, security threats and ...

... middle of paper ...

...licy | Issues with `trusted computing', Proceedings of PODC '03, July 13-16, 2003, Boston, Massachsetts, USA, ACM, 2003, pp. 3{10.

[16] B. Arbaugh, Improving the TCPA specification, IEEE Computer 35 (2002), no. 8, 77{79.

[17] GUNNAR STEVENS “Computer-Supported Access Control” Spetember 2009

[18] René Korthaus, Ahmad-Reza Sadeghi, Christian Stüble, Jing Zhan “A Practical Property-based Bootstrap Architecture” November 2009

[19] ROBERT GRIMM and BRIAN N. BERSHAD “Separating Access Control Policy, Enforcement, and Functionality in Extensible Systems” vol 19, No 1, pages 36-70, Feb 2001

[20] Daniel B. Faria, David R. Cheriton “DoS and Authentication in Wireless Public Access Networks” Sep 28, 2002

[21] Ulrich Kühn, Marcel Selhorst, and Christian Stüble “Realizing Property-Based Attestation and Sealing with Commonly Available Hard- and Software” 2007
Get Access