DocumentCode
1546780
Title
Toward Flexible Security and Trust Hardware Structures for Mobile-Portable Systems
Author
Fournaris, A.P.
Author_Institution
Univ. of Patras, Patras, Greece
Volume
10
Issue
3
fYear
2012
fDate
4/1/2012 12:00:00 AM
Firstpage
1719
Lastpage
1722
Abstract
Mobile and portable computing devices are claiming an increasingly big part of recent and future IT user applications. However, in security demanding environments like financial, government or crisis management systems, the mobile, portable world is unable to provide a strong security infrastructure capable of supporting a high level of trust to related mobile applications. In this paper, we discuss the existing hardware attempts toward providing strong security and trust mechanisms for mobile-portable systems. We focus our analysis on the Trusted Computing Group initiative for mobile trust and highlight the design and implementation problems of such endeavor. We propose using hardware efficient cryptographic algorithms for the Hardware mobile trust environments capable of supporting flexible security protocols and suggest Elliptic Curve cryptography and associated Pairing Based protocols as the best approach toward this end.
Keywords
cryptographic protocols; mobile computing; mobile handsets; public key cryptography; trusted computing; IT user application; Trusted Computing Group; cryptographic algorithm; elliptic curve cryptography; flexible security protocol; hardware mobile trust; hardware structure design; mobile computing; mobile portable system; pairing based protocol; Computers; Elliptic curve cryptography; Hardware; Mobile communication; Protocols; Elliptic Curve Cryptography; Hardware Design; Mobile Portable Security; Trusted Computing;
fLanguage
English
Journal_Title
Latin America Transactions, IEEE (Revista IEEE America Latina)
Publisher
ieee
ISSN
1548-0992
Type
jour
DOI
10.1109/TLA.2012.6222576
Filename
6222576
Link To Document