Secure mobile device structure for trust IoT

被引:3
|
作者
Lee, Yun-kyung [1 ,2 ]
Kim, Jeong-nyeo [2 ]
Lim, Kyung-Soo [2 ]
Yoon, Hyunsoo [1 ]
机构
[1] Korea Adv Inst Sci & Technol, Sch Comp, 291 Daehak Ro, Daejeon 34141, South Korea
[2] ETRI, 218 Gajeong Ro, Daejeon 34129, South Korea
来源
JOURNAL OF SUPERCOMPUTING | 2018年 / 74卷 / 12期
关键词
Mobile security; Domain separation; Secure execution engine; Trust IoT;
D O I
10.1007/s11227-017-2155-y
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In the IoT environment, all devices are connected to each other, and mobile device is considered as key device. But hacking into mobile devices is increasing rapidly with the increase in mobile device users. As the market share of Android OS increases, hacking of mobile devices has focused on Android devices. Although there are many security solutions for mobile devices, they are fragmentary for mobile threats; that is, they are solutions for only several threats rather than comprehensive solutions. There is hence a limit to protecting user's and company's data stored or used on mobile devices from various types of hacking. To address this, we propose a mobile device protection technology based on domain isolation. Virtualization technology has emerged to increase CPU utilization in server-class PCs and to run various OSs in one system. As these virtualization technologies become lightweight, they are beginning to be applied to embedded devices. In this paper, we applied this lightweight embedded virtualization technology to mobile devices to divide mobile devices into two areas. Therefore, users can have hidden area from hacker attack in addition to Android OS area which can use same as existing mobile device. There is a hardware-based mobile security solution using an secure element, but this has to be reflected in the manufacturing process of the mobile device. However, since the domain separation technology using the virtualization, proposed in this paper, is a software solution, it has an advantage that it can be applied to a device that is already in use. In addition, to protect the hidden area, application authentication/authorization and user authentication technology were applied. And we use white-box cryptography to get root of trust of the key which is used for secure storage and data encryption/decryption. We believe this is a fundamental solution for protecting the mobile device users from hacking. We implemented and tested various mobile applications operating on a mobile device that incorporates our proposed structure based on domain isolation. There is some performance degradation caused by the domain separation, but it is negligible. According to https://www.wired.com/insights/2012/11/mobile-supercomputers/, the chips for mobile phones have evolved and mobile phones will soon become supercomputers. In this case, the addition of virtualization to the mobile device will have less impact on the computing power of the mobile device, and data protection stored in mobile devices and secure execution environment of security programs will become more important issues. Therefore, our TeeMo structure is a necessary technology to protect mobile device users.
引用
收藏
页码:6646 / 6664
页数:19
相关论文
共 50 条
  • [41] Secure Federated Learning for IoT using DRL-based Trust Mechanism
    Al-Maslamani, Noora
    Abdallah, Mohamed
    Ciftler, Bekir Sait
    2022 INTERNATIONAL WIRELESS COMMUNICATIONS AND MOBILE COMPUTING, IWCMC, 2022, : 1101 - 1106
  • [42] Bring Trust to Edge: Secure and Decentralized IoT Framework with BFT and Permissioned Blockchain
    Wu, Yusen
    Liao, Jinghui
    Nguyen, Phuong
    Shi, Weisong
    Yesha, Yelena
    2022 IEEE INTERNATIONAL CONFERENCE ON EDGE COMPUTING & COMMUNICATIONS (IEEE EDGE 2022), 2022, : 104 - 113
  • [43] Public trust in a mobile device and service policy in South Korea: The Mobile Device Distribution Improvement Act
    Kim, Junghun
    Park, Sangkyu
    Cho, Heecheon
    Kim, Junsang
    Choi, Jae Young
    TELEMATICS AND INFORMATICS, 2017, 34 (02) : 540 - 547
  • [44] Secure Device-to-Device Authentication in Mobile Multi-hop Networks
    Kwon, Hyunsoo
    Hahn, Changhee
    Kim, Daeyoung
    Kang, Kyungtae
    Hur, Junbeom
    WIRELESS ALGORITHMS, SYSTEMS, AND APPLICATIONS, WASA 2014, 2014, 8491 : 267 - 278
  • [45] Secure IoT Device Authentication Scheme using Key Hiding Technology
    Kim, Byoungkoo
    Yoon, Seoungyong
    Kang, Yousung
    Choi, Dooho
    11TH INTERNATIONAL CONFERENCE ON ICT CONVERGENCE: DATA, NETWORK, AND AI IN THE AGE OF UNTACT (ICTC 2020), 2020, : 1808 - 1810
  • [46] Secure key agreement for multi-device home IoT environment
    Garg, Akash
    Lee, Taehee
    INTERNET OF THINGS, 2020, 11
  • [47] A Blockchain Based Secure IoT System Using Device Identity Management
    Sabrina, Fariza
    Li, Nan
    Sohail, Shaleeza
    SENSORS, 2022, 22 (19)
  • [48] Secure UAV-Aided Mobile Edge Computing for IoT: A Review
    Michailidis, Emmanouel T.
    Maliatsos, Konstantinos
    Skoutas, Dimitrios N.
    Vouyioukas, Demosthenes
    Skianis, Charalabos
    IEEE ACCESS, 2022, 10 : 86353 - 86383
  • [49] Practical and Secure IoT Device Authentication using Physical Unclonable Functions
    Wallrabenstein, John Ross
    2016 IEEE 4TH INTERNATIONAL CONFERENCE ON FUTURE INTERNET OF THINGS AND CLOUD (FICLOUD 2016), 2016, : 99 - 106
  • [50] A Smart and Secure Framework for IoT Device Based Multimedia Medical Data
    Murthy, Shrujana
    Kavitha, C. R.
    COMPUTATIONAL VISION AND BIO-INSPIRED COMPUTING, 2020, 1108 : 583 - 588