期刊文献+

基于SDKEY的安卓手机安全传输技术 被引量:4

SDKEY-based secure data transmission for android smartphones
下载PDF
导出
摘要 针对安卓手机之间安全传输敏感数据的问题,利用智能密码钥匙(SDKEY)提供的安全计算环境,提出了适用于安卓系统的解决方案。首先设计了一种利用SDKEY和个人识别密码(PIN)用于开机登陆和锁屏登陆的双重身份认证机制;其次,利用SDKEY的加解密算法实现了对系统里的敏感短信加密存储和加密传输的解决办法;最后,针对安卓手机间的数据传输提出了一种透明加密传输方案,同时还设计了2种密钥传递机制来解决密钥交换的问题。基于上述方案开发了一种原型系统,并进行了大量的系统性能测试和理论安全性分析。测试结果表明,该方案具备高性能标准,实现了增强安卓系统安全性的要求。 To resolve the more and more serious problems of sensitive data transmission for Android smart- phone, a method for secure data transmission was studied and presented by adopting secure computation environment of secure digital key (SDKEY). Firstly, a kind of dual-authentication scheme for login using SDKEY and personal identification number(PIN) was designed. Secondly, a solution on transparent en- cryption storage and transmission for sensitive SMS was proposed. Finally, a method of transparent en- cryption transmission between Android smartphones was presented, and several kinds of key mechanism for different scenarios were designed to implement key exchange. In this paper a prototype system based on the above solution was developed, its performance verified by the experimental tests, and its security ana- lyzed in detailed. The final results show that the security of prototype system with high performance can be improved by adopting SDKEY.
出处 《解放军理工大学学报(自然科学版)》 EI 北大核心 2015年第2期114-119,共6页 Journal of PLA University of Science and Technology(Natural Science Edition)
基金 新世纪优秀人才支持计划资助项目(NCET-11-0565) 长江学者和创新团队发展计划资助项目(IRT201206) 中央高校基本科研业务费专项资金资助项目(2015JBM041 2012JBZ010) 北京高校青年英才计划资助项目(YETP0548)
关键词 信息安全 智能密码钥匙 安全传输 身份认证 密钥交换 information security SDKEY secure transmission identity authentication key exchange
  • 相关文献

参考文献16

  • 1YU Hangjian, WU Shunxiang, ZHANG Yao. Phones' private data protection and synchronization based on Android OS[C]//The 4th IEEE International Confer- ence on Software Engineering and Service Science (IC- SESS) .Beijing : IEEE, 2013 :247-250. 被引量:1
  • 2YOU Wanqing, XU Longteng, RAO Jingyu. A compar- ison of TCP and SSL for mobile security[C]//2013 In- ternational Conference on Sensor Network Security Technology and Privacy Communication System (SNS PCS).Nangang : IEEE, 2013 : 206-209. 被引量:1
  • 3GLIGORIC N,DIMCIC T, DRAJIC D, et al. Applica-tion--layer security mechanism for M2M communica- tion over SMS[C]//The 20th Telecommunications Fo- rum (TELFOR).Belgrade: IEEE, 2012 : 5-8. 被引量:1
  • 4ABU-SAYMEH D, ABOU-TAIR D I, ZMILY A. An application security framework for near field communi- cation[C]//The 12th IEEE International Conference on Trust Security and Privacy in Computing and Com- munications (TrustCom) .Melbourne: IEEE, 2013 : 396- 403. 被引量:1
  • 5AHMAD Z, FRANCIS L, AHMED T, et al. Enhancing the security of mobile applications by using TEE and (U) SIM[C]//2013 IEEE 10th International Confer- ence on Ubiquitous Intelligence and Computing and 10th International Conference on Autonomic and Trus- ted Computing (UIC/ATC). Vietri sul Mere: IEEE, 2013 : 575-582. 被引量:1
  • 6SUDHA G,GANESAN R.Secure transmission medical data for pervasive healthcare system using android [C]//2013 International Conference on Communica- tions and Signal Processing (ICCSP). Melmaruvathur : IEEE, 2013 : 433-436. 被引量:1
  • 7VELEA R,TAPUS N, BARDAC M. IARCrypto[C]// The 19th International Conference on Control Systems and Computer Science (CSCS).Bucharest:IEEE,2013: 555-559. 被引量:1
  • 8WOO B C,WON H P,TAI M C.A study on jamming vulnerability of aeronautical communication system u- sing android phone[C]//2011 International Conference on Information Science and Applications (ICISA).Jeiu Island : IEEE, 2011 :1-5. 被引量:1
  • 9高倩..基于SDKey的移动银行安全研究[D].北京交通大学,2013:
  • 10贾凡,佟鑫.NFC手机支付系统的安全威胁建模[J].清华大学学报(自然科学版),2012,52(10):1460-1464. 被引量:20

二级参考文献19

  • 1蒋华,孙强.近距离无线通信技术标准解析[J].信息技术与标准化,2006(5):26-30. 被引量:29
  • 2蔡逆水.基于RFID专用读写模块和IC卡的手机支付新方案的研究[J].电信科学,2006,22(10):4-7. 被引量:3
  • 3ISO/IEC 18092.Information Technology-Telecommunicationsand Information Exchange between Systems-Near FieldCommunication—Interface and Protocol(NFCIP-1)[S].1stEd.Geneva,Switzerland:Joint Technical CommitteeISO/IEC,2004. 被引量:1
  • 4Madlmayr G,Dillinger O,Langer J,et al.The benefit ofusing SIM application toolkit in the context of near fieldcommunication applications for mobile applications[C] //Proceedings of the International Conference on theManagement of Mobile Business.Toronto,Canada:IEEE,2007:1-5. 被引量:1
  • 5Au Y A,Kauffman R J.The economics of mobile payments:Understanding stakeholder issues for an emerging financialtechnology application[J].Electronic Commerce Researchand Applications,2008,7(2):141-146. 被引量:1
  • 6Olga K.Apple plans service that lets iphone users pay withhandsets[Z/OL].(2012-04-21),http://www.bloomberg.com/news/2011-01-25/apple-plans-service-that-lets-iphone-users-pay-with-handsets.html. 被引量:1
  • 7Torr P.Demystifying the threat-modeling process[J].IEEESecurity and Privacy,2005,3(5):66-70. 被引量:1
  • 8Shostack A.Threat modeling series 2007[Z/OL].(2012-04-21),http://blogs.msdn.com/sdl/archive/tags/threat+modeling/default.aspx.published 2007-09and 2007-10. 被引量:1
  • 9Swiderski F,Snyder W.Threat Modeling[M].WashingtonDC,USA:Microsoft Press,2004:22-35. 被引量:1
  • 10Poore R S.International information security foundation,generally accepted system security principles release for publiccomment[Z/OL].(2012-04-23),http://www.infosectoday.com/Articles/gassp.pdf accessed on January11,2010. 被引量:1

共引文献53

同被引文献18

引证文献4

二级引证文献5

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部