Visible to the public Independent credible: Secure communication architecture of Android devices based on TrustZone

TitleIndependent credible: Secure communication architecture of Android devices based on TrustZone
Publication TypeConference Paper
Year of Publication2020
AuthorsWang, Y., Gao, W., Hei, X., Mungwarama, I., Ren, J.
Conference Name2020 International Conferences on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData) and IEEE Congress on Cybermatics (Cybermatics)
Keywordsandroid, android encryption, Computer architecture, Computer science, cryptography, ECDH, Encryption, Hardware, Human Behavior, Metrics, pubcrawl, resilience, Resiliency, Scalability, security, smart phones, TEE, TrustZone

The development of mobile internet has brought convenience to people, but the openness and diversity of mobile Internet make it face the security threat of communication privacy data disclosure. In this paper, a trusted android device security communication method based on TrustZone is proposed. Firstly, Elliptic Curve Diffie-Hellman (ECDH) key agreement algorithm is used to make both parties negotiate the session key in the Trusted Execution Environment (TEE), and then, we stored the key safely in the TEE. Finally, TEE completes the encryption and decryption of the transmitted data. This paper constructs a secure communication between mobile devices without a trusted third party and analyzes the feasibility of the method from time efficiency and security. The experimental results show that the method can resist malicious application monitoring in the process of data encryption and ensures the security of the session key. Compared with the traditional scheme, it is found that the performance of the scheme is not significantly reduced.

Citation Keywang_independent_2020