7th International Conference on Communications and Networking in China

Research Article

Efficient Transitive Trust Model for Mobile Terminal

  • @INPROCEEDINGS{10.1109/ChinaCom.2012.6417482,
        author={Tao Li and Aiqun Hu},
        title={Efficient Transitive Trust Model for Mobile Terminal},
        proceedings={7th International Conference on Communications and Networking in China},
        publisher={IEEE},
        proceedings_a={CHINACOM},
        year={2012},
        month={9},
        keywords={mobile security trusted computing transitive trust model},
        doi={10.1109/ChinaCom.2012.6417482}
    }
    
  • Tao Li
    Aiqun Hu
    Year: 2012
    Efficient Transitive Trust Model for Mobile Terminal
    CHINACOM
    IEEE
    DOI: 10.1109/ChinaCom.2012.6417482
Tao Li1,*, Aiqun Hu1
  • 1: School of Information Science and Engineering, Southeast University, Nanjing, China
*Contact email: leo.tao@hotmail.com

Abstract

Based on the theory of Trusted Computing Group (TCG), trust is extended from Trusted Computing Base (TCB) to Operating System (OS) and applications. But the efficient trust chain is required during boot and whole system running time. This paper describes a transitive trust model for mobile terminal. We propose a static trust chain by locating boot-code and OS image into TCB, which is more safety, reliability and efficiency than the trust structure of TCG. After boot, resources are protected by Trusted Agents (TA). Based on this mechanism, dynamic trust chain is proposed. Only the processes granted trust property by TA could access specific resources. The authors have also developed a prototype of trusted mobile terminal system. System booting time is shortened by 5.2s. The experiment results of files and network accessing indicate that the proposed model may cause system performance decrease between 0.1% and 16%. The presented model can be applied to build a high efficiency trusted mobile terminal.