{"id":"https://openalex.org/W3089062678","doi":"https://doi.org/10.1155/2020/1756130","title":"TZ-MRAS: A Remote Attestation Scheme for the Mobile Terminal Based on ARM TrustZone","display_name":"TZ-MRAS: A Remote Attestation Scheme for the Mobile Terminal Based on ARM TrustZone","publication_year":2020,"publication_date":"2020-09-23","ids":{"openalex":"https://openalex.org/W3089062678","doi":"https://doi.org/10.1155/2020/1756130","mag":"3089062678"},"language":"en","primary_location":{"id":"doi:10.1155/2020/1756130","is_oa":true,"landing_page_url":"https://doi.org/10.1155/2020/1756130","pdf_url":"https://downloads.hindawi.com/journals/scn/2020/1756130.pdf","source":{"id":"https://openalex.org/S120683614","display_name":"Security and Communication Networks","issn_l":"1939-0114","issn":["1939-0114","1939-0122"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319869","host_organization_name":"Hindawi Publishing Corporation","host_organization_lineage":["https://openalex.org/P4310319869"],"host_organization_lineage_names":["Hindawi Publishing Corporation"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Security and Communication Networks","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"hybrid","oa_url":"https://downloads.hindawi.com/journals/scn/2020/1756130.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5103247917","display_name":"Ziwang Wang","orcid":"https://orcid.org/0000-0003-3027-7003"},"institutions":[{"id":"https://openalex.org/I9842412","display_name":"Nanjing University of Aeronautics and Astronautics","ror":"https://ror.org/01scyh794","country_code":"CN","type":"education","lineage":["https://openalex.org/I9842412"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Ziwang Wang","raw_affiliation_strings":["Department of Computer Science and Technology, Nanjing University of Aeronautics and Astronautics, Nanjing 210008, China"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Technology, Nanjing University of Aeronautics and Astronautics, Nanjing 210008, China","institution_ids":["https://openalex.org/I9842412"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5068220355","display_name":"Yi Zhuang","orcid":"https://orcid.org/0000-0003-0706-0148"},"institutions":[{"id":"https://openalex.org/I9842412","display_name":"Nanjing University of Aeronautics and Astronautics","ror":"https://ror.org/01scyh794","country_code":"CN","type":"education","lineage":["https://openalex.org/I9842412"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Yi Zhuang","raw_affiliation_strings":["Department of Computer Science and Technology, Nanjing University of Aeronautics and Astronautics, Nanjing 210008, China"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Technology, Nanjing University of Aeronautics and Astronautics, Nanjing 210008, China","institution_ids":["https://openalex.org/I9842412"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5040134806","display_name":"Zujia Yan","orcid":"https://orcid.org/0000-0002-8870-7646"},"institutions":[{"id":"https://openalex.org/I9842412","display_name":"Nanjing University of Aeronautics and Astronautics","ror":"https://ror.org/01scyh794","country_code":"CN","type":"education","lineage":["https://openalex.org/I9842412"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zujia Yan","raw_affiliation_strings":["Department of Computer Science and Technology, Nanjing University of Aeronautics and Astronautics, Nanjing 210008, China"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Technology, Nanjing University of Aeronautics and Astronautics, Nanjing 210008, China","institution_ids":["https://openalex.org/I9842412"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5068220355"],"corresponding_institution_ids":["https://openalex.org/I9842412"],"apc_list":{"value":2100,"currency":"USD","value_usd":2100},"apc_paid":{"value":2100,"currency":"USD","value_usd":2100},"fwci":1.4951,"has_fulltext":true,"cited_by_count":13,"citation_normalized_percentile":{"value":0.86555584,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":98},"biblio":{"volume":"2020","issue":null,"first_page":"1","last_page":"16"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9944999814033508,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9937000274658203,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8675057291984558},{"id":"https://openalex.org/keywords/trusted-computing","display_name":"Trusted Computing","score":0.6470034122467041},{"id":"https://openalex.org/keywords/direct-anonymous-attestation","display_name":"Direct Anonymous Attestation","score":0.6155731678009033},{"id":"https://openalex.org/keywords/trusted-platform-module","display_name":"Trusted Platform Module","score":0.5365630984306335},{"id":"https://openalex.org/keywords/mobile-device","display_name":"Mobile device","score":0.5212598443031311},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.5138481259346008},{"id":"https://openalex.org/keywords/process","display_name":"Process (computing)","score":0.47286009788513184},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4625747501850128},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.4484198987483978},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.4457463026046753},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.26856452226638794}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8675057291984558},{"id":"https://openalex.org/C2776831232","wikidata":"https://www.wikidata.org/wiki/Q966812","display_name":"Trusted Computing","level":2,"score":0.6470034122467041},{"id":"https://openalex.org/C169796023","wikidata":"https://www.wikidata.org/wiki/Q3708936","display_name":"Direct Anonymous Attestation","level":3,"score":0.6155731678009033},{"id":"https://openalex.org/C202775310","wikidata":"https://www.wikidata.org/wiki/Q1140366","display_name":"Trusted Platform Module","level":2,"score":0.5365630984306335},{"id":"https://openalex.org/C186967261","wikidata":"https://www.wikidata.org/wiki/Q5082128","display_name":"Mobile device","level":2,"score":0.5212598443031311},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.5138481259346008},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.47286009788513184},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4625747501850128},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.4484198987483978},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.4457463026046753},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.26856452226638794},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1155/2020/1756130","is_oa":true,"landing_page_url":"https://doi.org/10.1155/2020/1756130","pdf_url":"https://downloads.hindawi.com/journals/scn/2020/1756130.pdf","source":{"id":"https://openalex.org/S120683614","display_name":"Security and Communication Networks","issn_l":"1939-0114","issn":["1939-0114","1939-0122"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319869","host_organization_name":"Hindawi Publishing Corporation","host_organization_lineage":["https://openalex.org/P4310319869"],"host_organization_lineage_names":["Hindawi Publishing Corporation"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Security and Communication Networks","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:2b8aec338feb48ac8e3f0457f524874a","is_oa":true,"landing_page_url":"https://doaj.org/article/2b8aec338feb48ac8e3f0457f524874a","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by-sa","license_id":"https://openalex.org/licenses/cc-by-sa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Security and Communication Networks, Vol 2020 (2020)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1155/2020/1756130","is_oa":true,"landing_page_url":"https://doi.org/10.1155/2020/1756130","pdf_url":"https://downloads.hindawi.com/journals/scn/2020/1756130.pdf","source":{"id":"https://openalex.org/S120683614","display_name":"Security and Communication Networks","issn_l":"1939-0114","issn":["1939-0114","1939-0122"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319869","host_organization_name":"Hindawi Publishing Corporation","host_organization_lineage":["https://openalex.org/P4310319869"],"host_organization_lineage_names":["Hindawi Publishing Corporation"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Security and Communication Networks","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G1231421488","display_name":null,"funder_award_id":"under","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G2087396116","display_name":null,"funder_award_id":"China","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G2218586538","display_name":null,"funder_award_id":"2016ZC52030","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G3317480652","display_name":null,"funder_award_id":"Science","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G4238289496","display_name":null,"funder_award_id":"61572253","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G5415833963","display_name":null,"funder_award_id":"61572253","funder_id":"https://openalex.org/F4320329330","funder_display_name":"Aviation Science Fund"},{"id":"https://openalex.org/G5994120800","display_name":null,"funder_award_id":"Natural","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G84161018","display_name":null,"funder_award_id":"2016ZC52030","funder_id":"https://openalex.org/F4320329330","funder_display_name":"Aviation Science Fund"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320329330","display_name":"Aviation Science Fund","ror":null}],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W3089062678.pdf","grobid_xml":"https://content.openalex.org/works/W3089062678.grobid-xml"},"referenced_works_count":8,"referenced_works":["https://openalex.org/W1912739689","https://openalex.org/W1966709388","https://openalex.org/W2006245221","https://openalex.org/W2091389859","https://openalex.org/W2322206419","https://openalex.org/W2789746206","https://openalex.org/W2913096406","https://openalex.org/W2997318410"],"related_works":["https://openalex.org/W2355956995","https://openalex.org/W2354645290","https://openalex.org/W2390768934","https://openalex.org/W2695299078","https://openalex.org/W2372678089","https://openalex.org/W1497930374","https://openalex.org/W2168345601","https://openalex.org/W2365715481","https://openalex.org/W2374998183","https://openalex.org/W104943326"],"abstract_inverted_index":{"With":[0],"the":[1,9,30,39,45,51,55,68,111,124,132,145,174,177,184,188,191,203,211,215,218,223,227,250],"widespread":[2],"use":[3],"of":[4,11,29,37,44,81,115,134,176,190,213,217,226,233],"mobile":[5,13,31,69,95,100,126],"embedded":[6],"devices":[7,84],"in":[8],"Internet":[10],"Things,":[12],"office,":[14],"and":[15,23,41,87,139,168,221,242,256],"edge":[16],"computing,":[17],"security":[18,32,73,113,255],"issues":[19],"are":[20,85,90],"becoming":[21],"more":[22,24],"serious.":[25],"Remote":[26],"attestation,":[27],"one":[28],"solutions,":[33],"is":[34,57,78,207],"a":[35,79,99,151,231,237],"process":[36,169],"verifying":[38],"identity":[40],"integrity":[42,154],"status":[43],"remote":[46,65,101,127],"computing":[47],"device,":[48],"through":[49],"which":[50,109,158,209],"challenger":[52],"determines":[53],"whether":[54],"platform":[56,228],"trusted":[58,82,119],"by":[59],"discovering":[60],"an":[61,194],"unknown":[62,162],"fingerprint.":[63],"The":[64,246],"attestation":[66,102,120,128],"on":[67,105,202],"terminal":[70],"faces":[71],"many":[72],"challenges":[74],"presently":[75],"because":[76],"there":[77],"lack":[80],"roots,":[83],"heterogeneous,":[86],"hardware":[88],"resources":[89],"strictly":[91],"limited.":[92],"To":[93,142],"ARM\u2019s":[94],"platform,":[96],"we":[97,149,235],"propose":[98,150],"scheme":[103,252],"based":[104,201],"ARM":[106],"TrustZone":[107,116],"(TZ-MRAS),":[108],"uses":[110],"highest":[112],"authority":[114],"to":[117,173],"implement":[118],"service.":[121],"Compared":[122],"with":[123],"existing":[125,260],"scheme,":[129],"it":[130],"has":[131,210,253],"advantages":[133,212],"wide":[135],"application,":[136],"easy":[137],"deployment,":[138],"low":[140],"cost.":[141],"defend":[143],"against":[144],"time-of-check-to-time-of-use":[146],"(TOC-TOU)":[147],"attack,":[148],"probe-based":[152],"dynamic":[153,179],"measurement":[155,180,192,197],"model,":[156,181],"ProbeIMA,":[157],"can":[159],"dynamically":[160],"detect":[161],"fingerprints":[163],"that":[164,182],"generate":[165],"during":[166],"kernel":[167],"execution.":[170],"Finally,":[171],"according":[172],"characteristics":[175],"improved":[178],"is,":[183],"ProbeIMA":[185],"will":[186],"expand":[187],"scale":[189],"dataset,":[193],"optimized":[195],"stored":[196],"log":[198],"construction":[199],"algorithm":[200],"locality":[204],"principle":[205],"(LPSML)":[206],"proposed,":[208],"shortening":[214],"length":[216],"authentication":[219],"path":[220],"improving":[222],"verification":[224],"efficiency":[225,257],"configuration.":[229],"As":[230],"proof":[232],"concept,":[234],"implemented":[236],"prototype":[238],"for":[239],"each":[240],"service":[241],"made":[243],"experimental":[244,247],"evaluations.":[245],"results":[248],"show":[249],"proposed":[251],"higher":[254],"than":[258],"some":[259],"schemes.":[261]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":4},{"year":2022,"cited_by_count":3},{"year":2021,"cited_by_count":4}],"updated_date":"2026-04-13T07:58:08.660418","created_date":"2025-10-10T00:00:00"}
