Implementation of a Hardware Security Chip for Mobile Devices

被引:0
|
作者
Ju, Hongil [1 ]
Kim, Youngsae [1 ]
Jeon, Yongsung [1 ]
Kim, Jeongnyeo [2 ]
机构
[1] Elect & Telecommun Res Inst, 218 Gajeongno, Daejeon 305700, South Korea
[2] Elect & Telecommun Res Inst, Cyber Secur Syst Res Dept, Daejeon 305700, South Korea
关键词
MTM; mobile device; mobile security; trusted computing;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
The purpose of this study is to suggest a solution to recently emerging security threats to mobile devices and enable users to use mobile services in a secure manner. To that end, this paper presents the design and implementation method for a hardware security chip required for providing advanced mobile security services. The proposed method could be the fastest and most efficient approach among various approaches. This study implements a Mobile Trusted Module (MTM) chip as a hardware security chip and confirms its commercial potential through interface testing with a smartphone. The implemented MTM chip is based on a smart card IC, and it includes an interface conversion chip that supports the I/O interface with a mobile device. The chip size is 5mm x 5mm, and the chip does not consume more than 10 mA of current. In addition, it provides additional security functions, including the required functions for an MTM chip. Therefore, with the proposed hardware security chip, it is possible to establish a secure service execution environment for mobile devices(1).
引用
收藏
页码:500 / 506
页数:7
相关论文
共 50 条
  • [21] Editorial: Security of Mobile Devices
    Shukla, Sandeep K.
    ACM TRANSACTIONS ON EMBEDDED COMPUTING SYSTEMS, 2017, 16 (04)
  • [22] Efficient hardware implementation of PMI plus for low-resource devices in mobile cloud computing
    Tang, Shaohua
    Lv, Bo
    Chen, Guomin
    Peng, Zhiniang
    Diene, Adama
    Chen, Xiaofeng
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2015, 52 : 116 - 124
  • [23] Determining security key the hardware for digital devices
    Zolotorevich, Ludmila A.
    Ilyinkov, Valery A.
    VESTNIK TOMSKOGO GOSUDARSTVENNOGO UNIVERSITETA-UPRAVLENIE VYCHISLITELNAJA TEHNIKA I INFORMATIKA-TOMSK STATE UNIVERSITY JOURNAL OF CONTROL AND COMPUTER SCIENCE, 2022, (60): : 102 - 110
  • [24] Improving online baneing security with hardware devices
    Puente, F
    Sandoval, JD
    Hernández, P
    Molina, CJ
    39TH ANNUAL 2005 INTERNATIONAL CARNAHAN CONFERENCE ON SECURITY TECHNOLOGY, PROCEEDINGS, 2005, : 174 - 177
  • [25] ON-CHIP HARDWARE SUPPORTS COMPUTER SECURITY FEATURES
    WELLS, P
    ELECTRONICS, 1984, 57 (05): : 128 - 130
  • [26] QUANTUM TUNNELING PUF: A CHIP FINGERPRINT FOR HARDWARE SECURITY
    Chuang, Kent Kai-Hsin
    Chen, Hsin-Ming
    Wu, Meng-Yi
    Yang, Evans Ching-Sung
    Hsu, Charles Ching-Hsiang
    2021 INTERNATIONAL SYMPOSIUM ON VLSI TECHNOLOGY, SYSTEMS AND APPLICATIONS (VLSI-TSA), 2021,
  • [27] Enhancement security level and hardware implementation of ECDSA
    Ghanmy, Nabil
    Chaari Fourati, Lamia
    Kamoun, Lotfi
    2013 IEEE SYMPOSIUM ON COMPUTERS AND COMMUNICATIONS (ISCC), 2013,
  • [28] UMTS security: system architecture and hardware implementation
    Kitsos, R.
    Sklavos, N.
    Koufopavlou, O.
    WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2007, 7 (04): : 483 - 494
  • [29] Hardware Implementation of ECIES Protocol on Security SoC
    Choi, Jun-Baek
    Kim, Dong-Seong
    Choe, Jun-Yeong
    Shin, Kyung-Wook
    2020 INTERNATIONAL CONFERENCE ON ELECTRONICS, INFORMATION, AND COMMUNICATION (ICEIC), 2020,
  • [30] Implementation of an FFT hardware accelerator for security applications
    Argenziano, Domenico
    2015 10TH INTERNATIONAL CONFERENCE ON P2P, PARALLEL, GRID, CLOUD AND INTERNET COMPUTING (3PGCIC), 2015, : 256 - 259