A new security scheme of trusted mobile platform based on MTM

被引:0
|
作者
Yang, Manzhi [1 ]
Zhou, Huixiang [1 ]
机构
[1] BUPT, State Key Lab Networking & Switching Technol, Beijing, Peoples R China
关键词
mobile platform; security; trusted computing; Mobile communication; trusted module;
D O I
暂无
中图分类号
TE [石油、天然气工业]; TK [能源与动力工程];
学科分类号
0807 ; 0820 ;
摘要
As a representative of the future development trend in the field of information security, the trusted computing technology is gaining increased attention, and has been widely used in the PC terminal. However, the more suitable environment for the application of trusted computing technology should be the new generation mobile communications network. Since the MTM (Mobile Trusted Module) has an incomparable superiority in performance, flexibility, scalability than the TPM (Trusted Platform Module), the mobile platform architecture design based on MTM can be more suitable for the needs of the next-generation mobile communication systems. This paper presents a secure boot process certified by direct measurement, which can not only meet the integrity requirement of the platform through the formal verification, but also avoid the trust losses caused by the traditional commission measure and verification. The results show that the proposed construction plan on the mobile platform and the secure boot process in this paper have better flexibility, security and credibility compared with the existing programs.
引用
收藏
页码:415 / 418
页数:4
相关论文
共 50 条
  • [1] Secure DRM scheme for future mobile networks based on trusted mobile platform
    Zheng, Y
    He, D
    Wang, HX
    Tang, XH
    [J]. 2005 INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING PROCEEDINGS, VOLS 1 AND 2, 2005, : 1164 - 1167
  • [2] A Lightweight Anonymous Mobile Shopping Scheme Based on DAA for Trusted Mobile Platform
    Yang, Bo
    Feng, Dengguo
    Qin, Yu
    [J]. 2014 IEEE 13TH INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM), 2014, : 9 - 17
  • [3] A new approach to multilevel security based on trusted computing platform
    Zuo, Xiao-Dong
    Liu, Feng-Mei
    Ma, Chao-Bin
    [J]. PROCEEDINGS OF 2007 INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND CYBERNETICS, VOLS 1-7, 2007, : 2158 - +
  • [4] Integrity Measurement Enhanced Security for Mobile Agent Based on Trusted Computing Platform
    Wu, Xiaoping
    Zhang, Huanguo
    Shen, Zhidong
    [J]. 2008 4TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-31, 2008, : 4805 - +
  • [5] A Property-Based Mobile Platform Trusted Authentication Scheme for Wireless Networks
    Sun, Lina
    Chang, Guiran
    Wang, Xingwei
    [J]. 2012 2ND INTERNATIONAL CONFERENCE ON APPLIED ROBOTICS FOR THE POWER INDUSTRY (CARPI), 2012, : 1157 - 1161
  • [6] A scheme based on trusted computing for terminal security
    Zhang, Jun
    Liu, Wei-peng
    Zhou, Zheng
    Li, Jian
    [J]. PROCEEDINGS OF THE FIRST INTERNATIONAL SYMPOSIUM ON DATA, PRIVACY, AND E-COMMERCE, 2007, : 218 - +
  • [7] A Security Technology for Mobile Agent System Improved by Trusted Computing Platform
    Shen, Zhidong
    Tong, Qiang
    [J]. HIS 2009: 2009 NINTH INTERNATIONAL CONFERENCE ON HYBRID INTELLIGENT SYSTEMS, VOL 3, PROCEEDINGS, 2009, : 46 - +
  • [8] Trusted Mobile Devices: Requirements for a Mobile Trusted Platform Module
    McGill, Kathleen N.
    [J]. JOHNS HOPKINS APL TECHNICAL DIGEST, 2013, 32 (02): : 544 - 554
  • [10] Research on Storage Security Based on Trusted Computing Platform
    He, Jian
    Xu, Mingdi
    [J]. PROCEEDINGS OF THE INTERNATIONAL SYMPOSIUM ON ELECTRONIC COMMERCE AND SECURITY, 2008, : 448 - +