Attestation of mobile baseband stacks
NSS'12 Proceedings of the 6th international conference on Network and System Security
Hi-index | 0.00 |
On the basis of comprehensive study of trusted computing technology and the threats to 3G network, a DAAbased key management and a trusted computing based access mechanism for 3G network are proposed, furthermore, a predicate logic based formal analysis method is also proposed. With DAA mechanism, user privacy is protected and the bottleneck problem of centralized CA is avoided. The proposed MTM-based trusted access mechanism focuses on not only the authentication of mobile user, but also the healthy status of the mobile user. Therefore, the UMTS network can forbid the unsafe mobile terminals from accessing it, which guarantees the security of the network from the source. The validity of trusted UMTS access scheme is verified with the proposed formal analysis method.