Trusted Mobile Devices : Requirements for a Mobile Trusted Platform Module

544 INTRODUCTION In recent years, mobile devices have replaced desktop PCs as the primary computing platform for many users. This trend is encouraged by convenient access to bank accounts, personal networks, and a wide range of networked resources through our tablets and mobile phones (see Fig. 1). Many organizations would like to use mobile devices in the work environment as a cost-savings and efficiency measure. Organizations may also wish to allow employees to use their personal mobile devices to access enterprise resources, an initiative commonly called “Bring Your Own Device.” Because most mobile devices lack the security measures available in more traditional computing platforms, enterprises are concerned about associated risks of integrating mobile devices into their networks. For example, most mobile devices do not include the hardware roots of trust that are built into traditional business-class platforms. These hardware roots of trust are the foundation of trust in any platform and enable security properties for protection-conscious enterprises that wish to use them. The National Institute of Standards and Technology (NIST) recommends a set of desired capabilities for n recent years, mobile devices have replaced desktop PCs as the computing platform of choice for many users. Unfortunately, most mobile devices lack the security measures, such as hardware roots of trust, available in more traditional business-class computing platforms. Researchers at APL are working with the Trusted Computing Group (TCG) to develop specifications for trusted computing technologies in mobile devices. These technologies will enable desirable security properties, such as device integrity and protected storage, in mobile devices. In this article, we provide an analysis of the diff iculties that must be overcome by those specifications. We describe key features of trusted mobile devices: roots of trust, the Trusted Platform Module (TPM) Mobile host environment, and the Secure Boot mechanism. We present and analyze an example implementation of a near-term trusted mobile phone. Finally, we outline the TPM Mobile roadmap to bring trusted mobile devices to market. Trusted Mobile Devices: Requirements for a Mobile Trusted Platform Module