Implementation of a Hardware Security Chip for Mobile Devices

被引:0
|
作者
Ju, Hongil [1 ]
Kim, Youngsae [1 ]
Jeon, Yongsung [1 ]
Kim, Jeongnyeo [2 ]
机构
[1] Elect & Telecommun Res Inst, 218 Gajeongno, Daejeon 305700, South Korea
[2] Elect & Telecommun Res Inst, Cyber Secur Syst Res Dept, Daejeon 305700, South Korea
关键词
MTM; mobile device; mobile security; trusted computing;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
The purpose of this study is to suggest a solution to recently emerging security threats to mobile devices and enable users to use mobile services in a secure manner. To that end, this paper presents the design and implementation method for a hardware security chip required for providing advanced mobile security services. The proposed method could be the fastest and most efficient approach among various approaches. This study implements a Mobile Trusted Module (MTM) chip as a hardware security chip and confirms its commercial potential through interface testing with a smartphone. The implemented MTM chip is based on a smart card IC, and it includes an interface conversion chip that supports the I/O interface with a mobile device. The chip size is 5mm x 5mm, and the chip does not consume more than 10 mA of current. In addition, it provides additional security functions, including the required functions for an MTM chip. Therefore, with the proposed hardware security chip, it is possible to establish a secure service execution environment for mobile devices(1).
引用
收藏
页码:500 / 506
页数:7
相关论文
共 50 条
  • [1] Efficient implementation of XML security for mobile devices
    Kangasharju, Jaakko
    2007 IEEE INTERNATIONAL CONFERENCE ON WEB SERVICES, PROCEEDINGS, 2007, : 134 - 141
  • [2] Hardware security concept for spontaneous network integration of mobile devices
    Sedov, I
    Haase, M
    Cap, C
    Timmermann, D
    INNOVATIVE INTERNET COMPUTING SYSTEMS, PROCEEDINGS, 2001, 2060 : 175 - 182
  • [3] Mobile Hardware Security
    Chandra, Vikas
    Aitken, Rob
    2014 IEEE HOT CHIPS 26 SYMPOSIUM (HCS), 2014,
  • [4] Hardware Security of CE Devices
    Sengupta, Anirban
    IEEE CONSUMER ELECTRONICS MAGAZINE, 2017, 6 (01) : 130 - 133
  • [5] Analytical study of hardware-rooted security standards and their implementation techniques in mobile
    Naveeda Ashraf
    Ashraf Masood
    Haider Abbas
    Rabia Latif
    Narmeen Shafqat
    Telecommunication Systems, 2020, 74 : 379 - 403
  • [6] Analytical study of hardware-rooted security standards and their implementation techniques in mobile
    Ashraf, Naveeda
    Masood, Ashraf
    Abbas, Haider
    Latif, Rabia
    Shafqat, Narmeen
    TELECOMMUNICATION SYSTEMS, 2020, 74 (03) : 379 - 403
  • [7] Hardware implementation of bluetooth security
    Kitsos, P
    Sklavos, N
    Papadomanolakis, K
    Koufopavlou, O
    IEEE PERVASIVE COMPUTING, 2003, 2 (01) : 21 - 29
  • [8] An Architecture and Implementation of Real-Time Sound Propagation Hardware for Mobile Devices
    Kim, Eunjae
    Choi, Sukwon
    Kim, Jiyoung
    Nah, Jae-Ho
    Jung, Woonam
    Lee, Tae-Hyeong
    Moon, Yeon-Kug
    Park, Woo-Chan
    PROCEEDINGS OF THE SIGGRAPH ASIA 2023 CONFERENCE PAPERS, 2023,
  • [9] Hardware Security in IoT Devices with Emphasis on Hardware Trojans
    Sidhu, Simranjeet
    Mohd, Bassam J.
    Hayajneh, Thaier
    JOURNAL OF SENSOR AND ACTUATOR NETWORKS, 2019, 8 (03)
  • [10] Hardware Devices Security, their Vulnerabilities and Solutions
    Qayyum, Sundus
    Ashraf, Sajjad
    Shafique, Muzammal
    Waheed, Salman
    PROCEEDINGS OF 2018 15TH INTERNATIONAL BHURBAN CONFERENCE ON APPLIED SCIENCES AND TECHNOLOGY (IBCAST), 2018, : 439 - 445