A Trusted Platform Module for Near Field Communication

作者: Michael Hutter , Ronald Toegl

DOI: 10.1109/ICSNC.2010.27

关键词:

摘要: Near Field Communication (NFC) has become widely available on smart phones. It helps users to intuitively establish communication between local devices. Accessing devices such as public terminals raises several security concerns in terms of confidentiality and trust. To overcome this issue, NFC can be used leverage the trusted-computing protocol remote attestation. In paper, we propose an NFC-enabled Trusted Platform Module (TPM) architecture that allows verify status terminals. For this, introduce autonomic low-cost NFC-compatible interface TPM create a direct trusted channel. Users access with The is based elliptic-curve cryptography provides efficient signing verifying security-status report. As proof-of-concept, implemented platform show trust decision realized commodity effectively help issues common public-terminal applications.

参考文章(13)
Ronald Toegl, Martin Pirker, Towards a Virtual Trusted Platform Journal of Universal Computer Science. ,vol. 16, pp. 531- 542 ,(2010)
Bryan Parno, Bootstrapping trust in a trusted platform usenix security symposium. pp. 9- ,(2008)
Martin Pirker, Ronald Toegl, Daniel Hein, Peter Danner, A PrivacyCA for Anonymity and Trust trust and trustworthy computing. pp. 101- 119 ,(2009) , 10.1007/978-3-642-00587-9_7
Ronald Toegl, Tagging the Turtle: Local Attestation for Kiosk Computing information security and assurance. pp. 60- 69 ,(2009) , 10.1007/978-3-642-02617-1_7
Martin Pirker, Ronald Toegl, Michael Gissing, Dynamic Enforcement of Platform Integrity Trust and Trustworthy Computing. pp. 265- 272 ,(2010) , 10.1007/978-3-642-13869-0_18
Ronald Toegl, Michael Hutter, An approach to introducing locality in remote attestation using near field communications The Journal of Supercomputing. ,vol. 55, pp. 207- 227 ,(2011) , 10.1007/S11227-010-0407-1
Qi Li, Xinwen Zhang, Jean-Pierre Seifert, Hulin Zhong, Secure Mobile Payment via Trusted Computing 2008 Third Asia-Pacific Trusted Infrastructure Technologies Conference. pp. 98- 112 ,(2008) , 10.1109/APTC.2008.24
Tetsuya Izu, Bodo Möller, Tsuyoshi Takagi, Improved Elliptic Curve Multiplication Methods Resistant against Side Channel Attacks international conference on cryptology in india. pp. 296- 313 ,(2002) , 10.1007/3-540-36231-2_24
Scott Garriss, Rámon Cáceres, Stefan Berger, Reiner Sailer, Leendert van Doorn, Xiaolan Zhang, Trustworthy and personalized computing on public kiosks Proceeding of the 6th international conference on Mobile systems, applications, and services - MobiSys '08. pp. 199- 210 ,(2008) , 10.1145/1378600.1378623
David Molnar, Andrea Soppera, David Wagner, Privacy for RFID through trusted computing Proceedings of the 2005 ACM workshop on Privacy in the electronic society - WPES '05. pp. 31- 34 ,(2005) , 10.1145/1102199.1102206