ABSTRACT
This paper presents a concept for enhancing mobile and embedded devices with trusted computing (TC)technology. It outlines a new architecture focusing on SUN's J2ME platform, including the design for a Mobile Trusted Module (MTM) to be used as a trusted computing base. The proposed architecture combines all software components required for accessing an MTM and shows how TC functionality can be provided for mobile applications. Moreover, different deployment scenarios of the architecture and its components are discussed. In order to prove that an implementation of the concept is feasible, a prototype of the architecture has been developed. For the design of the new architecture, special attention was turned to reusing currently existing technology and hardware rather than designing new hardware. By using already existing components, this paper also gives an answer to the question of how a mobile trusted-computing-enhanced system could be implemented with currently available technology
- Java Community Process JSR 218. Connected Device Configuration (CDC) 1.1. Specification available at: http://jcp.org/en/jsr/detail?id=218, 19 August 2005.Google Scholar
- Kurt Dietrich. Secrure Signature Creation using the Java 2 Micro Edition on Mobile Devices. Master's thesis, Institute for Applied Information Processing and Communications, Technical University Graz, Austria, Inffeldgasse 16a, 8010 Graz, Austria, October 2003.Google Scholar
- Trusted Computing Group Mobile Working Group. TCG Mobile Trusted Module Sepecification Version 1 rev. 1.0. Specification available online at: https://www.trustedcomputinggroup.org/specs/ mobilephone/tcg-mobile-trusted-module-1.0.pdf, 12 June 2007.Google Scholar
- Trusted Computing Group TPM Working Group. TPM Main Part 2 Structures. Specification available at: https://www.trustedcomputinggroup.org/ specs/TPM/Main_Part2_Rev94.zip, 29 March 2006. Specification version 1.2 Level 2 Revision 94.Google Scholar
- Trusted Computing Group TPM Working Group. TPM Main Part 3 Commands. Specification available online at: https://www.trustedcomputinggroup.org/ specs/TPM/Main_Part3_Rev94.zip, 29 March 2006. Specification version 1.2 Level 2 Revision 94.Google Scholar
- Trusted Computing Group TSS Working Group. TCG Software Stack (TSS) Specification Version 1.2 Level 1. Specification available online at: https://www.trustedcomputinggroup.org/specs/TSS/TSS_Version_1.2_Level_1_FINAL.pdf, 6 January 2006. Part1: Commands and Structures.Google Scholar
- International Organisation for Standardisation. ISO/IEC 7816-4, 2005. Part 4: Interindustry commands for interchange.Google Scholar
- Trusted Computing for Java. Available online at: http://trustedjava.sourceforge.net/.Google Scholar
- Yellin Frank Lindholm Tim. The Java Virtual Machine Specification.Second Edition. Available online at: http://java.sun.com/docs/books/jvms/ second_edition/html/VMSpecTOC.doc.html.Google Scholar
- ARM Ltd. SecurCore SC200. Overview available at: http://www.arm.com/products/CPUs/SecurCore_SC200.html, 19 August 2005.Google Scholar
- Sun Microsystems. Java Card Technology. Overview available at: http://java.sun.com/products/javacard/.Google Scholar
- Sun Microsystems. Java Native Interface Specification. Available online at: http://java.sun.com/j2se/1.5.0/docs/guide/jni/spec/jniTOC.html.Google Scholar
- Chamseddine Talhi Mourad Debbabi, Mohamed Saleh and Sami Zhioua. Security Evaluation of J2ME CLDC Embedded Java Platform. Journal of Object Technlogy, 5(2):125--154, March-April 2006.Google Scholar
- SUN Developer Network. Java ME at a Glance. Specifications & Articles availablbe at: http://java.sun.com/javame/index.jsp.Google Scholar
- Enrique C. Ortiz. Introduction to OTA Application Provisioning. Technical report, SUN Developer Network, November 2002. Article available at: http://developers.sun.com/mobility/midp/articles/ota/.Google Scholar
- Siani Pearson. Trusted Computing Platforms, the Next Security Solution. Technical report, Trusted E-Services Laboratory, HP Laboratories Bristol HPL-2002-221, 5 November 2002.Google Scholar
- SUN Community process JSR 139. J2ME(TM) Connected Limited Device Configuration (CLDC) Specification 1.1 Final Release. Specification available at: http://jcp.org/aboutJava/communityprocess/final/jsr139/index.html, 4 March 2004.Google Scholar
- SUN Community process JSR 271. J2ME(TM) Mobile Information Device Profile (MIDP) 3.0. Draft available at: http://www.jcp.org/en/jsr/detail?id=271. Work in progress.Google Scholar
- Müller Thomas Sarmenta Luis, Rhodes Jonathan. TPM/J Java-based API for the Trusted Platform Module (TPM). Available online at: http://projects.csail.mit.edu/tc/tpmj/, 3 April 2007.Google Scholar
- Janne Uusilehto. How to establish mobile security. Available online at: http://www.mobilehandsetdesignline.com/showArticle.jhtml?printableArticle=true&articleId=196701831, 24 December 2006.Google Scholar
Index Terms
- An integrated architecture for trusted computing for java enabled embedded devices
Recommendations
Design and implementation of mobile trusted module for trusted mobile computing
This paper presents the design and implementation of a Mobile Trusted Module (MTM) which should satisfy small area and low-power condition. Unlike the general Trusted Platform Module (TPM) for PCs, the MTM, that is to be employed in mobile devices, has ...
Specification and Standardization of a Java Trusted Computing API
The paradigm of Trusted Computing promises a new approach to improve the security of computer systems. The core functionality, based on a hardware component known as Trusted Platform Module, is integrated into commodity hardware. However, operating ...
Compact and unified hardware architecture for SHA-1 and SHA-256 of trusted mobile computing
This paper presents a compact and unified hardware architecture implementing SHA-1 and SHA-256 algorithms that is suitable for the mobile trusted module (MTM), which should satisfy small area and low-power condition. The built-in hardware hash engine in ...
Comments