International Research Journal of Engineering and Technology (IRJET)
e-ISSN: 2395 -0056
Volume: 04 Issue: 03 | Mar -2017
p-ISSN: 2395-0072
www.irjet.net
IMPLEMENTATION OF SECURITY CHIP FOR MOBILE DEVICES
Wawdane Priyanka R.1, Chormale Sushma C. 2,Mali Ravina G.3 , Prof. Meenakshi Annamalai4 E&TC Dept. JSPM’s BSIOTR, Wagholi, Pune 412207 E&TC Dept. JSPM’s BSIOTR, Wagholi, Pune 412207 3 E&TC Dept. JSPM’s BSIOTR, Wagholi, Pune 412207 3 Assistant Professor, E&TC Dept. JSPM’s BSIOTR, Wagholi, Pune, Maharashtra, India. 1 2
---------------------------------------------------------------------***--------------------------------------------------------------------2. LITERATURE SERVEY Abstract - The purpose of this paper to secure mobile devices. Usually mobile devices are easily hacked by the hacker or any software by flashing of ROM. The main aims of paper to secure mobile devices from the software and hacker it secure the devices through the hardware. The hardware is known as MTM chip (Mobile trusted module). This chip is going to interface with the mobile devise. Through IO interfaces, UART and various IO devices. The size of chip should be as small as possible for the mobile devices .It also provides the additional functions through software. It has own software to operate and it is user friendly for the user to secure their mobile devices from any threats. In this paper we implement hardware based security devices which provides security through hardware and as well as software.
Recently we can see the rapid growth of mobile devices almost everyone has their devices like bring your own devices [1]. BOYD’s benefits are clear employees are more familiar and satisfied while using their own devices and employers save money by not having to pay for high prices devices and data planes. Companies’ goals with BOYD are to increases the flexibility. Convenience and portability of devices in order to order cater to their employees work flow, which increases their productivity. But in BOYD the various threads can be occurred like spam messages, spoof caller ID, MMS sender ID. After that the survey is going to take under security for mobile devices[2] in that mobile can be secured using various communication components through GPS,GSM and the network layer only but the BOYD cannot be safe and data can be stored on cloud and is carried out only observations of data corruption and there execution but data can be corrupted using no network also for that a trusted module is executed[3].In mobile computing the data can be kept secured using hardware devices and get secured the algorithm used for the encryption of data is 3DES,AES and SHA-1 for the security operations speed for that 10 mbps and 1154 mbps. Machine cycle required for the execution of AES are the 1616 for 128 bits and also 128 key. AES and SHA-1 uses separate code for encryption and decryption. It only developed on hardware basis there is no interface of software among this [3] type of interface. Technological advancement in computing, communicational devices, as well as network connectivity is shifting the usages of conventional desktop computers to mobile devices. It is predicted that there will be a staggering amount of over 2 billion smartphones users worldwide by the year 201. The increasing reliance on these devices inevitably implies the increase in sensitive data stored on this platform, unfortunately, the portability of mobile devices also makes it vulnerable to theft [4]. As more and more capabilities are added to cell phones, the issue of mobile phone security is of increasing concern to cell phone stakeholders (Malicious code moves to mobile devices). Security concerns are intensified because these expanded capabilities boost the incentive for and multiply the opportunities for perpetrating security attacks [5]. The issue complicated by the fact that
Key Words: MTM chip, Hummingbird algorithm, Security chip, smart card IC.
1. INTRODUCTION Now a days we all uses electronics devices to store sensitive data but the data can be hacked easily by the hacker through the software and also mobile, laptops stolen cases is rises for that we implement security chip which secured the devices from the theft. In this paper we implement hardware based security devices which provides security through hardware and as well as software. It checks that is user uses their own devices or that device is of another user. It checks the password which is entered by the user through the application based on hardware security. That password is checked by the hardware and confirmed the user. If the password is correct then and only then the user can use their mobile devices or if the password is incorrect hardware tells that the password is wrong and switched off the mobile by saying that the user is not correct. The chip is as small as possible that can be fit in the mobile or other electronic devices.
© 2017, IRJET
|
Impact Factor value: 5.181
|
ISO 9001:2008 Certified Journal
|
Page 120