06.11.2014 Views

A User Centric Security Model for Tamper-Resistant Devices

A User Centric Security Model for Tamper-Resistant Devices

A User Centric Security Model for Tamper-Resistant Devices

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

5.1 Introduction<br />

5.1 Introduction<br />

Existing multi-application smart card plat<strong>for</strong>ms (e.g. Java [7], Multos [8]) support the installation<br />

of applications remotely (after issuance of the card). Standardisation eorts to<br />

manage an application remotely like GlobalPlat<strong>for</strong>m [9] have been eective in the ICOM.<br />

The advent of NFC technology and the growing convergence of dierent services to mobile<br />

phones has prompted GlobalPlat<strong>for</strong>m and the GSMA 1 to propose new management architectures<br />

(e.g. TSM) [43, 50, 155, 156]. Similarly, Multos has a strong card and application<br />

management architecture that is heavily issuer centric and it can be argued that it can<br />

easily be adapted to the TSM architecture.<br />

The GlobalPlat<strong>for</strong>m and Multos card and application management architectures provide<br />

two contrasting views of the smart card industry. We limit our discussion of traditional<br />

card management architectures with these two examples. As <strong>for</strong> the Java Card, it does<br />

not have any associated management architecture and in most commercial deployments it<br />

is coupled with the GlobalPlat<strong>for</strong>m management architecture.<br />

The device management architecture in the UCTD framework has to consider the contrasting<br />

needs of the administrative authority and cardholder. It must determine the ownership<br />

requirements of each of these entities and then articulate how a UCTD framework will manage<br />

them. In addition, the management architecture proposed in this chapter deals with<br />

application issuance (lease), application domain provision on the smart card, installation,<br />

deletion, and application/domain management. This chapter serves as the framework to<br />

the proposed protocols in the subsequent chapter.<br />

As the UCTD management architecture brings dierent views on smart card management,<br />

it also brings new security issues. These issues concern the device and its owner.<br />

They include the simulator problem, the user ownership issue, and the parasite application<br />

problem.<br />

Structure of the Chapter: The GlobalPlat<strong>for</strong>m card management framework is discussed<br />

in section 5.2 followed by the Multos card management framework in section 5.3.<br />

The proposed framework of UCTD management is described in section 5.4, along with<br />

various types of relationships a user and an SP can have in the UCOM. In section 5.5, we<br />

discuss the issues that are raised due to the proposed UCTD management framework and<br />

related countermeasures.<br />

1 The GSM Association (GSMA) is an association that represents the interest of mobile operators<br />

worldwide along with developing and prompting the Global System <strong>for</strong> Mobile Communication (GSM)<br />

specication.<br />

111

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!