Font Size: a A A

Research And Design Of Security Mobile Terminal Based On Trusted Computing

Posted on:2012-12-11Degree:MasterType:Thesis
Country:ChinaCandidate:J H CaoFull Text:PDF
GTID:2248330395485742Subject:Information and Communication Engineering
Abstract/Summary:PDF Full Text Request
With the rapid development of communication and computer technology, thecomputing ability and resource storage capacity of mobile terminals increaseconstantly, thus, wireless applications are becoming more and more popular.Computerized mobile terminals and the mobile Internet is the trend for the NextGeneration Mobile Network (NGMN). Consequently, the mobile terminals arebecoming the major human-machine interaction tool instead of PC. However,openness and flexibility of the mobile platforms make the mobile terminals sufferinggreat security threats. Therefore, how to protect the security of mobile terminal isvital to the development of wireless communication.The security issues of mobile termination had been thoroughly studied in thisthesis. Through analyzing and comparing with the traditional security techniques,trusted computing technology is adopted to solve the security problem of mobileterminals in the NGMN. Combined with trusted mobile platform structure, a mobileterminal platform based on trusted computing had been proposed to ensure theintegrity and security of mobile terminals. This thesis contains the followed contents:Firstly, this thesis analyzes the mobile terminal security threats and potentialdangers in existing communication system. For the security demands in the NGMN,we formulate the related safety protection strategies to solve the security problems ofmobile terminal in the user domain. Then, based on the further study of basic theories,trusted computing is carried on the current intelligent terminal mainstreamdual-processor mobile platform. Furthermore, the security mobile terminal structurebased on trusted computing is designed to protect the security and integrity of themobile terminals. Moreover, by analyzing of the existing problems in trust chaintransfer model, an improved structure of trust transfer and a complete trust chainmodel are proposed, which are more suitable for mobile terminal. Finally, the formalverification method is used to prove the correctness of the complete trust chain model,and the experiment is carried out to analyze the feasibility and effectiveness of ourmodel.The innovations of this thesis are as followed:(1) By introducing the ideas of trusted computing and structure of the trustedmobile platform, this thesis puts forward a new mobile terminal protection schemebased on trusted computing, and designs a direct measurement/verification modelwith data backup and recovery functions. When the platform starts, the loaded components accept the integrity measurement/verification, the attacked or temperedcomponents are restored, which can strengthen the security and reliability of themobile platform.(2) This thesis proposes an extended trust transmission model, which containsboth the static and dynamic trust mechanism. The extended trust transmission modelprotects the mobile terminals by calling function list to limit and monitor all kinds ofapplication. When error occurs during the running time, the current application stopsto prevent further damages. The formal verification and experiment shows that ourmodel can satisfy the demands of correctness, security and feasibility for the mobileterminals.
Keywords/Search Tags:trusted computing, security, mobile terminal, trust chain, next network
PDF Full Text Request
Related items