Trusted computing based user authentication for mobile equipment

被引:0
|
作者
Zheng, Yu [1 ]
He, Da-Ke [1 ]
He, Ming-Xing [2 ]
机构
[1] Laboratory of Information Security and National Computing Grid, Southwest Jiaotong University, Chengdu 610031, China
[2] School of Mathematics and Computer Science, Xihua University, Chengdu 610039, China
来源
关键词
Artificial intelligence - Calculations - Computer hardware - Computer networks - Computer software - Functions - Mobile computing - Network protocols - Public key cryptography - Security of data - Smart cards - Wireless telecommunication systems;
D O I
暂无
中图分类号
学科分类号
摘要
In this paper, according to the features of mobile equipment (ME) an example of constructing trusted mobile platform (TMP) is presented based on the smart phone's processor, along with which three alternative methods to build trusted platform module (TPM) are discussed as well. In the framework of TMP, through combining password and fingerprint with the USIM card via RSA-KEM (Key Encapsulate Mechanism) and Hash function, a user authentication scheme is proposed to improve the security of the user domain, which achieves the mutual identification among user, ME and USIM even if their public-key certificates are issued by different certificate authorities (CAs). Moreover, the user authentication can not only easily distinguish the valid users from the pretenders but also identify the owner of ME from the genuine operators without any pre-negotiation. The performance analysis and experimental test result show that no matter what kinds of TPM is employed authors' authentication scheme is more secure, efficient and flexible than the corresponding scheme presented in TMP draft standard and achieves advanced security and better flexibility as compared to the schemes proposed by Lee, Lin et al.
引用
收藏
页码:1255 / 1264
相关论文
共 50 条
  • [21] Mobile Security and Trusted Computing
    Mitchell, Chris
    IT-INFORMATION TECHNOLOGY, 2006, 48 (06): : 321 - 326
  • [22] Content Protection based on Trusted computing in Mobile Terminal
    Liu Ren
    Niu Dongxiao
    2009 INTERNATIONAL CONFERENCE ON INFORMATION MANAGEMENT, INNOVATION MANAGEMENT AND INDUSTRIAL ENGINEERING, VOL 2, PROCEEDINGS, 2009, : 192 - 195
  • [23] A Trusted Third Party-based Authentication Scheme in Cloud Computing
    Li, Ying
    Du, Li-Ping
    Zhao, Gui-Fen
    INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND COMMUNICATION ENGINEERING (CSCE 2015), 2015, : 850 - 856
  • [24] An Enhanced Secure Authentication Scheme with User Anonymity in Mobile Cloud Computing
    Madhusudhan, R.
    Suvidha, K. S.
    2017 INTERNATIONAL CONFERENCE ON PUBLIC KEY INFRASTRUCTURE AND ITS APPLICATIONS (PKIA 2017), 2017, : 17 - 22
  • [25] Efficient handover authentication with user anonymity and untraceability for Mobile Cloud Computing
    Yang, Xu
    Huang, Xinyi
    Liu, Joseph K.
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2016, 62 : 190 - 195
  • [26] Implementation of a TCG-based trusted computing in mobile device
    Choi, SuGil
    Han, JinHee
    Lee, JeongWoo
    Kim, JongPil
    Jun, SungIk
    TRUST, PRIVACY AND SECURITY IN DIGITAL BUSINESS, PROCEEDINGS, 2008, 5185 : 18 - 27
  • [27] Based on Trusted Computing Solutions for Mobile Payment Terminal Security
    Yu, Haiyong
    Li, Peng
    NINTH WUHAN INTERNATIONAL CONFERENCE ON E-BUSINESS, VOLS I-III, 2010, : 570 - 574
  • [28] A document protection solution in mobile platform based on trusted computing
    Yu, Xiaojun
    Wen, Qiaoyan
    Yan, Tao
    2ND INTERNATIONAL SYMPOSIUM ON COMPUTER NETWORK AND MULTIMEDIA TECHNOLOGY (CNMT 2010), VOLS 1 AND 2, 2010, : 251 - 255
  • [29] User Authentication in Cloud Computing
    Chang, Hyokyung
    Choi, Euiin
    UBIQUITOUS COMPUTING AND MULTIMEDIA APPLICATIONS, PT II, 2011, 151 : 338 - 342
  • [30] A mobile and portable trusted computing platform
    Surya Nepal
    John Zic
    Dongxi Liu
    Julian Jang
    EURASIP Journal on Wireless Communications and Networking, 2011