DESIGN AND IMPLEMENTATION OF TRUSTED COMPUTING-BASED MUTUAL AUTHENTICATION MODEL FOR MOBILE TERMINAL

被引:0
|
作者
Ma, Zhuo [1 ]
Lin, Wei-min [1 ]
Zhang, Tao [1 ]
Deng, Song [1 ]
机构
[1] State Grid Elect Power Res Inst, Inst Informat & Commun, Nanjing 210003, Peoples R China
关键词
Trusted Computing; Mobile Terminal; Mutual Authentication; Trusted Platform Module;
D O I
暂无
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
Since the security shortage in the authentication process for the mobile communication is existing, a mutual authentication scheme of user and platform based on trusted computing is proposed. According to the unique of trusted computing platform, the process of the mutual authentication includes user identity and platform identity. Not only does the proposed solution achieve mutual authentication based on trusted computing, but it also greatly reduces the computation and communication cost of the mobile terminals and with a high security and efficiency. Finally, some comparisons of the security and implementation efficiency are discussed between the proposed scheme and the existing authentication scheme.
引用
收藏
页码:309 / 313
页数:5
相关论文
共 50 条
  • [1] Design and Implementation of Mobile Trusted Module for Trusted Mobile Computing
    Kim, Mooseop
    Ju, Hongil
    Kim, Youngsae
    Park, Jiman
    Park, Youngsoo
    [J]. IEEE TRANSACTIONS ON CONSUMER ELECTRONICS, 2010, 56 (01) : 134 - 140
  • [2] Design and Implementation of Mobile Trusted Module for Trusted Mobile Computing
    Kim, Mooseop
    Kim, Youngsae
    Ju, Hongil
    Park, Youngsoo
    [J]. 2010 DIGEST OF TECHNICAL PAPERS INTERNATIONAL CONFERENCE ON CONSUMER ELECTRONICS ICCE, 2010,
  • [3] Trusted Computing Based Mobile DRM Authentication Scheme
    Yang, Zhen
    Fan, Kefeng
    Lai, Yingxu
    [J]. FIFTH INTERNATIONAL CONFERENCE ON INFORMATION ASSURANCE AND SECURITY, VOL 1, PROCEEDINGS, 2009, : 7 - +
  • [4] Content Protection based on Trusted computing in Mobile Terminal
    Liu Ren
    Niu Dongxiao
    [J]. 2009 INTERNATIONAL CONFERENCE ON INFORMATION MANAGEMENT, INNOVATION MANAGEMENT AND INDUSTRIAL ENGINEERING, VOL 2, PROCEEDINGS, 2009, : 192 - 195
  • [5] Trusted computing-based security architecture for 4G mobile networks
    Zheng, Y
    He, DK
    Yu, WC
    Tang, XH
    [J]. PDCAT 2005: SIXTH INTERNATIONAL CONFERENCE ON PARALLEL AND DISTRIBUTED COMPUTING, APPLICATIONS AND TECHNOLOGIES, PROCEEDINGS, 2005, : 251 - 255
  • [6] Based on Trusted Computing Solutions for Mobile Payment Terminal Security
    Yu, Haiyong
    Li, Peng
    [J]. NINTH WUHAN INTERNATIONAL CONFERENCE ON E-BUSINESS, VOLS I-III, 2010, : 570 - 574
  • [7] Implementation of a TCG-based trusted computing in mobile device
    Choi, SuGil
    Han, JinHee
    Lee, JeongWoo
    Kim, JongPil
    Jun, SungIk
    [J]. TRUST, PRIVACY AND SECURITY IN DIGITAL BUSINESS, PROCEEDINGS, 2008, 5185 : 18 - 27
  • [8] Research on Smart Mobile Terminal Security Technology Based on Trusted Computing
    Li, Ming
    Fang, Yuan
    Liu, Jun
    [J]. AGRO FOOD INDUSTRY HI-TECH, 2017, 28 (01): : 3278 - 3281
  • [9] Anonymous authentication scheme of trusted mobile terminal under mobile Internet
    ZHANG De-dong
    MA Zhao-feng
    NIU Xin-xin
    Peng Yong
    [J]. The Journal of China Universities of Posts and Telecommunications, 2013, (01) : 58 - 65
  • [10] Anonymous authentication scheme of trusted mobile terminal under mobile Internet
    ZHANG Dedong
    MA Zhaofeng
    NIU Xinxin
    Peng Yong
    [J]. The Journal of China Universities of Posts and Telecommunications., 2013, 20 (01) - 65