DESIGN AND IMPLEMENTATION OF TRUSTED COMPUTING-BASED MUTUAL AUTHENTICATION MODEL FOR MOBILE TERMINAL

被引:0
|
作者
Ma, Zhuo [1 ]
Lin, Wei-min [1 ]
Zhang, Tao [1 ]
Deng, Song [1 ]
机构
[1] State Grid Elect Power Res Inst, Inst Informat & Commun, Nanjing 210003, Peoples R China
关键词
Trusted Computing; Mobile Terminal; Mutual Authentication; Trusted Platform Module;
D O I
暂无
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
Since the security shortage in the authentication process for the mobile communication is existing, a mutual authentication scheme of user and platform based on trusted computing is proposed. According to the unique of trusted computing platform, the process of the mutual authentication includes user identity and platform identity. Not only does the proposed solution achieve mutual authentication based on trusted computing, but it also greatly reduces the computation and communication cost of the mobile terminals and with a high security and efficiency. Finally, some comparisons of the security and implementation efficiency are discussed between the proposed scheme and the existing authentication scheme.
引用
收藏
页码:309 / 313
页数:5
相关论文
共 50 条
  • [21] Mutual Authentication for Mobile Cloud Computing: Review and Suggestion
    Ahmed, Abdulghani Ali
    Wendy, Kwan
    [J]. 2017 IEEE CONFERENCE ON APPLICATION, INFORMATION AND NETWORK SECURITY (AINS), 2017, : 75 - 80
  • [22] Efficient implementation of the keyed-hash message authentication code based on SHA-1 algorithm for mobile trusted computing
    Kim, Mooseop
    Kim, Youngse
    Ryou, Jaecheol
    Jun, Sungik
    [J]. AUTONOMIC AND TRUSTED COMPUTING, PROCEEDINGS, 2007, 4610 : 410 - +
  • [23] A novel trusted computing model for network security authentication
    Xing, Ling
    Jiang, Ling
    Yang, Guohai
    Wen, Bin
    [J]. Journal of Networks, 2014, 9 (02) : 339 - 343
  • [24] Design of Secure and Efficient Authentication Protocol for Edge Computing-Based Augmented Reality Environments
    Kwon, Deokkyu
    Park, Youngho
    [J]. ELECTRONICS, 2024, 13 (03)
  • [25] Edge Computing-Based VANETs' Anonymous Message Authentication
    Yang, Chengjun
    Peng, Jiansheng
    Xu, Yong
    Wei, Qingjin
    Zhou, Ling
    Tang, Yuna
    [J]. SYMMETRY-BASEL, 2022, 14 (12):
  • [26] Fast authentication public key infrastructure for mobile ad hoc networks based on trusted computing
    Hao, Liming
    Li, Xiehua
    Yang, Shutang
    Lu, Songnian
    [J]. 2006 IEEE INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-4, 2006, : 910 - 913
  • [27] A scheme based on trusted computing for terminal security
    Zhang, Jun
    Liu, Wei-peng
    Zhou, Zheng
    Li, Jian
    [J]. PROCEEDINGS OF THE FIRST INTERNATIONAL SYMPOSIUM ON DATA, PRIVACY, AND E-COMMERCE, 2007, : 218 - +
  • [28] Design and Implementation of RFID Mutual Authentication Protocol
    Li, Hung-Lin
    Yuan, Ching-Chien
    Yen, Chia-Hao
    Huang, Yu-Jung
    Lin, Wei-Cheng
    [J]. PROCEEDINGS OF THE 3RD INTERNATIONAL CONFERENCE ON ANTI-COUNTERFEITING, SECURITY, AND IDENTIFICATION IN COMMUNICATION, 2009, : 229 - 232
  • [29] An FPGA Implementation of Stochastic Computing-based LSTM
    Maor, Guy
    Zeng, Xiaoming
    Wang, Zhendong
    Hu, Yang
    [J]. 2019 IEEE 37TH INTERNATIONAL CONFERENCE ON COMPUTER DESIGN (ICCD 2019), 2019, : 38 - 46
  • [30] Analytical offloading design for mobile edge computing-based smart internet of vehicle
    Jinrong Lu
    Lunyuan Chen
    Junjuan Xia
    Fusheng Zhu
    Maobin Tang
    Chengyuan Fan
    Jiangtao Ou
    [J]. EURASIP Journal on Advances in Signal Processing, 2022