Implementation of a Hardware Security Chip for Mobile Devices

被引:0
作者
Ju, Hongil [1 ]
Kim, Youngsae [1 ]
Jeon, Yongsung [1 ]
Kim, Jeongnyeo [2 ]
机构
[1] Elect & Telecommun Res Inst, 218 Gajeongno, Daejeon 305700, South Korea
[2] Elect & Telecommun Res Inst, Cyber Secur Syst Res Dept, Daejeon 305700, South Korea
关键词
MTM; mobile device; mobile security; trusted computing;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
The purpose of this study is to suggest a solution to recently emerging security threats to mobile devices and enable users to use mobile services in a secure manner. To that end, this paper presents the design and implementation method for a hardware security chip required for providing advanced mobile security services. The proposed method could be the fastest and most efficient approach among various approaches. This study implements a Mobile Trusted Module (MTM) chip as a hardware security chip and confirms its commercial potential through interface testing with a smartphone. The implemented MTM chip is based on a smart card IC, and it includes an interface conversion chip that supports the I/O interface with a mobile device. The chip size is 5mm x 5mm, and the chip does not consume more than 10 mA of current. In addition, it provides additional security functions, including the required functions for an MTM chip. Therefore, with the proposed hardware security chip, it is possible to establish a secure service execution environment for mobile devices(1).
引用
收藏
页码:500 / 506
页数:7
相关论文
共 17 条
[1]  
[Anonymous], 2014, TCG SPEC TPM 2 0 MOB
[2]  
[Anonymous], 2001, FIPS PUB
[3]  
[Anonymous], 2013, TCG PC CLIENT SPEC T
[4]  
[Anonymous], 2012, 1804 NIST FIPS PUB
[5]  
Arthur W., 2015, A practical guide to TPM 2.0: Using the Trusted Platform module in the new age of security
[6]   TEEI - A Mobile Security Infrastructure for TEE Integration [J].
Chai, Hongfeng ;
Lu, Zhijun ;
Meng, Qingyang ;
Wang, Jun ;
Zhang, Xiubang ;
Zhang, Zhijian .
2014 IEEE 13TH INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM), 2014, :914-920
[7]   The Untapped Potential of Trusted Execution Environments on Mobile Devices [J].
Ekberg, Jan-Erik ;
Kostiainen, Kari ;
Asokan, N. .
IEEE SECURITY & PRIVACY, 2014, 12 (04) :29-37
[8]   Teaching an Old TPM New Tricks: Repurposing for Identity-Based Signatures [J].
Goh, Weihan ;
Yeo, Chai Kiat .
IEEE SECURITY & PRIVACY, 2013, 11 (05) :28-35
[9]  
ISO/IEC, 2006, 78163 ISOIEC
[10]   Design and Implementation of Mobile Trusted Module for Trusted Mobile Computing [J].
Kim, Mooseop ;
Ju, Hongil ;
Kim, Youngsae ;
Park, Jiman ;
Park, Youngsoo .
IEEE TRANSACTIONS ON CONSUMER ELECTRONICS, 2010, 56 (01) :134-140