Using mobile phones to enhance computing platform trust

被引:0
|
作者
Feng, Wei [1 ]
Qin, Yu [1 ]
Feng, Dengguo [1 ]
机构
[1] Chinese Acad Sci, Trusted Comp & Informat Assurance Lab, Inst Software, Beijing 100190, Peoples R China
基金
中国国家自然科学基金;
关键词
Trusted computing; Remote attestation; Secure communication; Formal model; Mobile device; SYSTEMS;
D O I
10.1007/s11235-018-0456-y
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
This paper presents a new method to enhance the trust of traditional computing device by using the popular mobile phone. We first propose a formal method to analyze the platform trust establishment process based on trusted computing technology, and the formal results reveal possible attack and suggest potential solutions. Then, we design an improved solution, in which the mobile phone is extended to support three trusted computing functions: using mobile phone as a root of trust instead of Trusted Platform Module, as a local investigator to obtain evidences from the local computing platform, and as a trusted agent to build a secure communication channel with an external entity in the remote attestation applications. Finally, to describe the feasibility and efficiency, a prototype of the trusted mobile phone is implemented and evaluated based on an ARM development board.
引用
收藏
页码:187 / 205
页数:19
相关论文
共 50 条
  • [41] The Android mobile phone platform - Google's play to change the face of mobile phones
    Thompson, Tom
    DR DOBBS JOURNAL, 2008, 33 (09): : 40 - +
  • [42] Turning mobile phones into a mobile quiz platform to challenge players' knowledge: An experience report
    Tam, Vincent
    Cheung, S. W.
    Fok, Wilton
    Lui, K. S.
    Wong, Jade
    Yip, Beta
    8TH IEEE INTERNATIONAL CONFERENCE ON ADVANCED LEARNING TECHNOLOGIES, PROCEEDINGS, 2008, : 943 - +
  • [43] Mobile server: An efficient mobile computing platform based on mobile agent
    Hu, WB
    Meng, B
    2005 INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING PROCEEDINGS, VOLS 1 AND 2, 2005, : 1339 - 1342
  • [44] How mobile phones can enhance or hamper e-business
    Cao, Sheng
    Zhang, Daijun
    Cao, Haijun
    NINTH WUHAN INTERNATIONAL CONFERENCE ON E-BUSINESS, VOLS I-III, 2010, : 677 - 681
  • [45] Using Mobile Phones to Examine and Enhance Perceptions of Control in Mildly Depressed and Nondepressed Volunteers: Intervention Study
    Msetfi, Rachel
    O'Sullivan, Donal
    Walsh, Amy
    Nelson, John
    Van de Ven, Pepijn
    JMIR MHEALTH AND UHEALTH, 2018, 6 (11):
  • [46] Harnessing Spectrum Awareness to Enhance Mobile Computing
    Mahmoodi, S. Eman
    Subbalakshmi, K. P.
    Uma, R. N.
    MOBICOM'16: PROCEEDINGS OF THE 22ND ANNUAL INTERNATIONAL CONFERENCE ON MOBILE COMPUTING AND NETWORKING, 2016, : 460 - 461
  • [47] Security analysis on trust chain of trusted computing platform
    Xu M.-D.
    Zhang H.-G.
    Zhao H.
    Li J.-L.
    Yan F.
    Jisuanji Xuebao/Chinese Journal of Computers, 2010, 33 (07): : 1165 - 1176
  • [48] A New Mobile Learning Platform Based on Mobile Cloud Computing
    Huang, Shuqiang
    Yin, Hongkuan
    ADVANCES IN FUTURE COMPUTER AND CONTROL SYSTEMS, VOL 1, 2012, 159 : 393 - +
  • [49] Adolescents’ risk perceptions on mobile phones and their base stations, their trust to authorities and incivility in using mobile phones: a cross-sectional survey on 2240 high school students in Izmir, Turkey
    Hur Hassoy
    Raika Durusoy
    Ali Osman Karababa
    Environmental Health, 12
  • [50] Openness as a business strategy: Historical perspectives on openness in computing and mobile phones
    Garcia-Swartz, Daniel D.
    Campbell-Kelly, Martin
    INFORMATION ECONOMICS AND POLICY, 2019, 48 : 1 - 14