MA-TEECM: Mutual Anonymous Authentication-Based Credential Migration Technology for Mobile Trusted Execution Environments

نویسندگان

چکیده

ARM TrustZone is the most widely used mobile trusted execution environment (TEE) technology today. Its hardware-enabled isolated provides reliable assurance of secure storage credentials in devices. However, research on managing stored TEE throughout lifecycle devices has received little attention recent years, and generally face usability problems caused by device events. Aiming at risk information disclosure third-party service providers traditional credential migration scheme, this paper presents a mutual anonymous authentication-based framework for environments. First, we propose peer-to-peer model between terminals based SGX, which solves single point failure attacks third parties that act as transfer stations managers solutions; Second, an identity authentication protocol TEEs authentication, detailed process designed universal model; Third, build formal verification using High-Level Protocol Specification Language (HLPSL). Finally, informal security analysis indicate improved scheme meets expected requirements against several known attacks.

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Implementation Aspects of Anonymous Credential Systems for Mobile Trusted Platforms

Anonymity and privacy protection are very important issues for Trusted Computing enabled platforms. Protection mechanisms are required in order to hide activities of the trusted platforms when performing cryptography based transactions over the Internet, which would otherwise compromise the platform’s privacy and with it the users’s anonymity. In order to address this problem, the Trusted Compu...

متن کامل

Authentication Without Identification using Anonymous Credential System

Privacy and security are often intertwined. For example, identity theft is rampant because we have become accustomed to authentication by identification. To obtain some service, we provide enough information about our identity for an unscrupulous person to steal it (for example, we give our credit card number to Amazon.com). One of the consequences is that many people avoid e-commerce entirely ...

متن کامل

TATA: Towards Anonymous Trusted Authentication

Mobile devices may share resources even in the presence of untrustworthy devices. To do so, each device may use a computational model that on input of reputation information produces trust assessments. Based on such assessments, the device then decides with whom to share: it will likely end up sharing only with the most trustworthy devices, thus isolating the untrustworthy ones. All of this is,...

متن کامل

Trusted Anonymous Authentication Scheme for Trusted Network Connection in Mobile Environment

Technologies make the mobile terminals such as smart phones, PDAs and handsets much more powerful to access mobile network in recent years. Especially with the widely use of mobile terminals, mobile network now becomes a primary tool for daily and business interactions. However, the proliferation of mobile terminals also draws mobile malware’s attention which will do damage to the mobile termin...

متن کامل

Using Trusted Execution Environments in Two-factor Authentication: comparing approaches

Classic two-factor authentication has been around for a long time and has enjoyed success in certain markets (such as the corporate and the banking environment). A reason for this success are the stronger security properties, particularly where user interaction is concerned. These properties hinge on a security token being a physically separate device. This paper investigates whether Trusted Ex...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: IEEE Access

سال: 2023

ISSN: ['2169-3536']

DOI: https://doi.org/10.1109/access.2023.3235372