Secure user authentication based on the trusted platform for mobile devices

被引:7
|
作者
Kim, GeonLyang [1 ]
Lim, JaeDeok [1 ]
Kim, JeongNyeo [1 ]
机构
[1] Elect & Telecommun Res Inst, Informat Secur Res Div, Daejeon, South Korea
关键词
Authentication Server; Normal Zone; Security Application; Mobile Cloud Computing; Secure Function;
D O I
10.1186/s13638-016-0729-7
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
In recent years, the use of mobile devices including smartphones has increased significantly all over the world, and e-commerce using smartphones has also greatly increased. Furthermore, many people are using their smartphones to carry out certain aspects of their work according to the BYOD trend. Therefore, it is extremely important that mobile device users are authenticated securely by remote servers when using their smartphones. Digital certificates are one of the many solutions available for authentication, but they are easy to copy and leak. Mobile device services need to properly manage registered devices and users, and trusted means of authenticating their identities are needed. In this paper, we propose a secure certificate-based user authentication framework using the trusted mobile zone (TMZ) system into which the trusted platform is built. The TMZ system is a secure mobile device into which a hypervisor is built on the mobile device, and in which the hypervisor separates the mobile device into a normal zone and a secure zone. Android OS operates in the normal zone on the TMZ systems, and secure OS is run in the secure zone at the same time. The trusted platform is built in the normal zone and the secure zone in order to provide the user with secure services. In this paper, we propose a TMZ system founded on the TEE system of the global platform. The TMZ system provides a secure execution environment in which to store sensitive data and execute security functions securely. In conclusion, we describe the experimental results of generating the signature data in the TMZ system.
引用
收藏
页数:15
相关论文
共 50 条
  • [1] Secure user authentication based on the trusted platform for mobile devices
    GeonLyang Kim
    JaeDeok Lim
    JeongNyeo Kim
    [J]. EURASIP Journal on Wireless Communications and Networking, 2016
  • [2] An interactive and secure user authentication scheme for mobile devices
    Sun, Qibin
    Li, Zhi
    Jiang, Xudong
    Kot, Alex
    [J]. PROCEEDINGS OF 2008 IEEE INTERNATIONAL SYMPOSIUM ON CIRCUITS AND SYSTEMS, VOLS 1-10, 2008, : 2973 - +
  • [3] Trusted computing based user authentication for mobile equipment
    Zheng, Yu
    He, Da-Ke
    He, Ming-Xing
    [J]. Jisuanji Xuebao/Chinese Journal of Computers, 2006, 29 (08): : 1255 - 1264
  • [4] Trusted user authentication scheme combining password with fingerprint for mobile devices
    Zheng, Yu
    Xia, Jingchun
    He, Dake
    [J]. 2008 INTERNATIONAL SYMPOSIUM ON BIOMETRICS AND SECURITY TECHNOLOGIES, 2008, : 63 - +
  • [5] A User Authentication Scheme Based on Trusted Platform for Cloud Computing
    Mo, Jiaqing
    Hu, Zhongwang
    Lin, Yuhua
    [J]. SECURITY, PRIVACY, AND ANONYMITY IN COMPUTATION, COMMUNICATION, AND STORAGE, 2016, 10066 : 122 - 130
  • [6] Trusted mobile devices: Requirements for a mobile Trusted Platform Module
    [J]. McGill, K.N. (kathleen.mcgill@jhuapl.edu), 2013, John Hopkins University (32):
  • [7] Trusted Mobile Devices: Requirements for a Mobile Trusted Platform Module
    McGill, Kathleen N.
    [J]. JOHNS HOPKINS APL TECHNICAL DIGEST, 2013, 32 (02): : 544 - 554
  • [8] Toward Secure User-Habit-Oriented Authentication for Mobile Devices
    Seto, Jamie
    Wang, Ye
    Lin, Xiaodong
    [J]. 2014 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM 2014), 2014, : 1225 - 1231
  • [9] Secure DRM scheme for future mobile networks based on trusted mobile platform
    Zheng, Y
    He, D
    Wang, HX
    Tang, XH
    [J]. 2005 INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING PROCEEDINGS, VOLS 1 AND 2, 2005, : 1164 - 1167
  • [10] User Authentication for Mobile Devices
    Rogowski, Marcin
    Saeed, Khalid
    Rybnik, Mariusz
    Tabedzki, Marek
    Adamski, Marcin
    [J]. COMPUTER INFORMATION SYSTEMS AND INDUSTRIAL MANAGEMENT, CISIM 2013, 2013, 8104 : 47 - 58