Secure mobile device structure for trust IoT

被引:3
|
作者
Lee, Yun-kyung [1 ,2 ]
Kim, Jeong-nyeo [2 ]
Lim, Kyung-Soo [2 ]
Yoon, Hyunsoo [1 ]
机构
[1] Korea Adv Inst Sci & Technol, Sch Comp, 291 Daehak Ro, Daejeon 34141, South Korea
[2] ETRI, 218 Gajeong Ro, Daejeon 34129, South Korea
来源
JOURNAL OF SUPERCOMPUTING | 2018年 / 74卷 / 12期
关键词
Mobile security; Domain separation; Secure execution engine; Trust IoT;
D O I
10.1007/s11227-017-2155-y
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In the IoT environment, all devices are connected to each other, and mobile device is considered as key device. But hacking into mobile devices is increasing rapidly with the increase in mobile device users. As the market share of Android OS increases, hacking of mobile devices has focused on Android devices. Although there are many security solutions for mobile devices, they are fragmentary for mobile threats; that is, they are solutions for only several threats rather than comprehensive solutions. There is hence a limit to protecting user's and company's data stored or used on mobile devices from various types of hacking. To address this, we propose a mobile device protection technology based on domain isolation. Virtualization technology has emerged to increase CPU utilization in server-class PCs and to run various OSs in one system. As these virtualization technologies become lightweight, they are beginning to be applied to embedded devices. In this paper, we applied this lightweight embedded virtualization technology to mobile devices to divide mobile devices into two areas. Therefore, users can have hidden area from hacker attack in addition to Android OS area which can use same as existing mobile device. There is a hardware-based mobile security solution using an secure element, but this has to be reflected in the manufacturing process of the mobile device. However, since the domain separation technology using the virtualization, proposed in this paper, is a software solution, it has an advantage that it can be applied to a device that is already in use. In addition, to protect the hidden area, application authentication/authorization and user authentication technology were applied. And we use white-box cryptography to get root of trust of the key which is used for secure storage and data encryption/decryption. We believe this is a fundamental solution for protecting the mobile device users from hacking. We implemented and tested various mobile applications operating on a mobile device that incorporates our proposed structure based on domain isolation. There is some performance degradation caused by the domain separation, but it is negligible. According to https://www.wired.com/insights/2012/11/mobile-supercomputers/, the chips for mobile phones have evolved and mobile phones will soon become supercomputers. In this case, the addition of virtualization to the mobile device will have less impact on the computing power of the mobile device, and data protection stored in mobile devices and secure execution environment of security programs will become more important issues. Therefore, our TeeMo structure is a necessary technology to protect mobile device users.
引用
收藏
页码:6646 / 6664
页数:19
相关论文
共 50 条
  • [1] Secure mobile device structure for trust IoT
    Yun-kyung Lee
    Jeong-nyeo Kim
    Kyung-Soo Lim
    Hyunsoo Yoon
    The Journal of Supercomputing, 2018, 74 : 6646 - 6664
  • [2] Dynamic Trust-Based Device Legitimacy Assessment Towards Secure IoT Interactions
    Garagad, Vishwanath
    Iyer, Nalini
    JOURNAL OF COMMUNICATIONS SOFTWARE AND SYSTEMS, 2022, 18 (03) : 269 - 276
  • [3] Secure Trust Management for Mobile Platforms
    Ege, Raimund K.
    2014 INTERNATIONAL CONFERENCE ON COMPUTING, NETWORKING AND COMMUNICATIONS (ICNC), 2014, : 381 - 385
  • [4] Trust Relationships in Secure Mobile Systems
    Li, Tao
    Hu, Aiqun
    2013 IEEE WIRELESS COMMUNICATIONS AND NETWORKING CONFERENCE (WCNC), 2013, : 1882 - 1887
  • [5] Authentication of IoT Device and IoT Server Using Secure Vaults
    Shah, Trusit
    Venkatesan, S.
    2018 17TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (IEEE TRUSTCOM) / 12TH IEEE INTERNATIONAL CONFERENCE ON BIG DATA SCIENCE AND ENGINEERING (IEEE BIGDATASE), 2018, : 819 - 824
  • [6] Trust Schemas and ICN: Key to Secure Home IoT
    Nichols, Kathleen
    PROCEEDINGS OF THE 2021 8TH ACM CONFERENCE ON INFORMATION-CENTRIC NETWORKING (ICN '21), 2021, : 95 - 106
  • [7] Secure IoT Device Architecture Using TrustZone
    Sasaki, Takayuki
    Tomita, Koki
    Hayaki, Yuto
    Liew, Seng Pei
    Yamagaki, Norio
    2020 IEEE INTERNATIONAL CONFERENCE ON SENSING, COMMUNICATION AND NETWORKING (SECONWORKSHOPS), 2020,
  • [8] Establishing and Maintaining Trust in a Mobile Device
    Carver, Kristopher
    Sritapan, Vincent
    Corbett, Cherita
    IT PROFESSIONAL, 2015, 17 (06) : 66 - 68
  • [9] SUTSEC: SDN Utilized trust based secure clustering in IoT
    Kalkan, Kubra
    COMPUTER NETWORKS, 2020, 178
  • [10] Secure Cryptographic Unit as Root-of-Trust for IoT Era
    Matsumoto, Tsutomu
    Ikeda, Makoto
    Nagata, Makoto
    Uemura, Yasuyoshi
    IEICE TRANSACTIONS ON ELECTRONICS, 2021, E104C (07) : 262 - 271