Trusted computing based user authentication for mobile equipment

被引:0
|
作者
Zheng, Yu [1 ]
He, Da-Ke [1 ]
He, Ming-Xing [2 ]
机构
[1] Laboratory of Information Security and National Computing Grid, Southwest Jiaotong University, Chengdu 610031, China
[2] School of Mathematics and Computer Science, Xihua University, Chengdu 610039, China
来源
关键词
Artificial intelligence - Calculations - Computer hardware - Computer networks - Computer software - Functions - Mobile computing - Network protocols - Public key cryptography - Security of data - Smart cards - Wireless telecommunication systems;
D O I
暂无
中图分类号
学科分类号
摘要
In this paper, according to the features of mobile equipment (ME) an example of constructing trusted mobile platform (TMP) is presented based on the smart phone's processor, along with which three alternative methods to build trusted platform module (TPM) are discussed as well. In the framework of TMP, through combining password and fingerprint with the USIM card via RSA-KEM (Key Encapsulate Mechanism) and Hash function, a user authentication scheme is proposed to improve the security of the user domain, which achieves the mutual identification among user, ME and USIM even if their public-key certificates are issued by different certificate authorities (CAs). Moreover, the user authentication can not only easily distinguish the valid users from the pretenders but also identify the owner of ME from the genuine operators without any pre-negotiation. The performance analysis and experimental test result show that no matter what kinds of TPM is employed authors' authentication scheme is more secure, efficient and flexible than the corresponding scheme presented in TMP draft standard and achieves advanced security and better flexibility as compared to the schemes proposed by Lee, Lin et al.
引用
收藏
页码:1255 / 1264
相关论文
共 50 条
  • [41] Efficient implementation of the keyed-hash message authentication code based on SHA-1 algorithm for mobile trusted computing
    Kim, Mooseop
    Kim, Youngse
    Ryou, Jaecheol
    Jun, Sungik
    AUTONOMIC AND TRUSTED COMPUTING, PROCEEDINGS, 2007, 4610 : 410 - +
  • [42] Anonymous RFID Authentication Using Trusted Computing Technologies
    Dietrich, Kurt
    RADIO FREQUENCY IDENTIFICATION: SECURITY AND PRIVACY ISSUES, 2010, 6370 : 91 - 102
  • [43] A novel trusted computing model for network security authentication
    Xing, Ling
    Jiang, Ling
    Yang, Guohai
    Wen, Bin
    Journal of Networks, 2014, 9 (02) : 339 - 343
  • [44] User Authentication for Mobile Devices
    Rogowski, Marcin
    Saeed, Khalid
    Rybnik, Mariusz
    Tabedzki, Marek
    Adamski, Marcin
    COMPUTER INFORMATION SYSTEMS AND INDUSTRIAL MANAGEMENT, CISIM 2013, 2013, 8104 : 47 - 58
  • [45] A Property-Based Mobile Platform Trusted Authentication Scheme for Wireless Networks
    Sun, Lina
    Chang, Guiran
    Wang, Xingwei
    2012 2ND INTERNATIONAL CONFERENCE ON APPLIED ROBOTICS FOR THE POWER INDUSTRY (CARPI), 2012, : 1157 - 1161
  • [46] A COHERENT AUTHENTICATION FRAMEWORK FOR MOBILE COMPUTING BASED ON HOMOMORPHIC SIGNATURE AND IMPLICIT AUTHENTICATION
    Mohammed, Hamdun
    Fati, Suliman Mohamed
    Ponnusamy, Vasaki
    Yaik, Ooi Boon
    Annur, Robithoh
    Yue, Liew Soung
    PROCEEDINGS OF THE 6TH INTERNATIONAL CONFERENCE ON COMPUTING AND INFORMATICS: EMBRACING ECO-FRIENDLY COMPUTING, 2017, : 426 - 434
  • [47] ID-Based User Authentication Scheme for Cloud Computing
    PingLiang Chen
    JenHo Yang
    ChingI Lin
    JournalofElectronicScienceandTechnology, 2013, 11 (02) : 221 - 224
  • [48] An ID-Based User Authentication Scheme for Cloud Computing
    Yang, Jen-Ho
    Lin, Pei-Yu
    2014 TENTH INTERNATIONAL CONFERENCE ON INTELLIGENT INFORMATION HIDING AND MULTIMEDIA SIGNAL PROCESSING (IIH-MSP 2014), 2014, : 98 - 101
  • [49] ID-Based User Authentication Scheme for Cloud Computing
    Ping-Liang Chen
    Jen-Ho Yang
    Ching-I Lin
    Journal of Electronic Science and Technology, 2013, (02) : 221 - 224
  • [50] Anonymous authentication scheme of trusted mobile terminal under mobile Internet
    Zhang, D.-D. (zhdd0411@163.com), 1600, Beijing University of Posts and Telecommunications (20):