Implementation of a hardware security chip for mobile devices
- 1 November 2015
- journal article
- Published by Institute of Electrical and Electronics Engineers (IEEE) in IEEE Transactions on Consumer Electronics
- Vol. 61 (4), 500-506
- https://doi.org/10.1109/tce.2015.7389805
Abstract
The purpose of this study is to suggest a solution to recently emerging security threats to mobile devices and enable users to use mobile services in a secure manner. To that end, this paper presents the design and implementation method for a hardware security chip required for providing advanced mobile security services. The proposed method could be the fastest and most efficient approach among various approaches. This study implements a Mobile Trusted Module (MTM) chip as a hardware security chip and confirms its commercial potential through interface testing with a smartphone. The implemented MTM chip is based on a smart card IC, and it includes an interface conversion chip that supports the I/O interface with a mobile device. The chip size is 5mm × 5mm, and the chip does not consume more than 10 mA of current. In addition, it provides additional security functions, including the required functions for an MTM chip. Therefore, with the proposed hardware security chip, it is possible to establish a secure service execution environment for mobile devices.Keywords
This publication has 10 references indexed in Scilit:
- Highly Secure Mobile Devices Assisted with Trusted Cloud Computing EnvironmentsETRI Journal, 2015
- A Practical Guide to TPM 2.0Published by Springer Science and Business Media LLC ,2015
- TEEI - A Mobile Security Infrastructure for TEE IntegrationPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2014
- The Untapped Potential of Trusted Execution Environments on Mobile DevicesIEEE Security & Privacy, 2014
- Bring your own device security issues and challengesPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2014
- Teaching an Old TPM New Tricks: Repurposing for Identity-Based SignaturesIEEE Security & Privacy, 2013
- A Survey on Security for Mobile DevicesIEEE Communications Surveys & Tutorials, 2012
- Trustworthy Execution on Mobile Devices: What Security Properties Can My Mobile Platform Give Me?Lecture Notes in Computer Science, 2012
- Smart Card HandbookPublished by Wiley ,2010
- Design and implementation of mobile trusted module for trusted mobile computingIEEE Transactions on Consumer Electronics, 2010