06.11.2014 Views

A User Centric Security Model for Tamper-Resistant Devices

A User Centric Security Model for Tamper-Resistant Devices

A User Centric Security Model for Tamper-Resistant Devices

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

6.5 Application Acquisition and Contractual Agreement Protocol<br />

The ActApp acts as an application activation message and it will be included in message six<br />

as an optional parameter (OP). In this scenario, the last two messages will be redundant<br />

and will not be executed. The session keys k SP −AD and mk SP −AD are generated from<br />

long terms keys shared between the SP and AD. Similarly, the session key k SC−AD is also<br />

generated from the long term key shared between the SC and AD<br />

The SP will generate the contract message (spc) that certies to the SC that the SP is<br />

satised with the current state of the SC and the downloaded application.<br />

The SC will verify the spc. Subsequently, if the SP is a member of the AD syndicate,<br />

then it will verify the OP. If the SP is not a member of the AD syndicate then the SC<br />

will proceed with the following messages.<br />

STCP ACA -7. SC : mE = ek SC−AD (AD i ||SC i ||U i ||AppDoD||N ′ SC )<br />

SC → AD : SC i ′||mE||f mkSC−AD (mE)||SID AD−SC<br />

When the SP is not a member of the AD, the user requires the AD to issue the ActApp.<br />

The SC will request the AD to issue ActApp by sending message seven. The SC will use a<br />

one-time pseudo card identity (SC i ) so that an eavesdropper would not be able to retrieve<br />

the SC i . The SC will encrypt the message containing the identities of AD, SC, and user.<br />

It then appends the application details (AppDoD) and a new random number generated<br />

by the SC. The AppDoD will not have any details of the application that can help the AD<br />

to uniquely identify either the SP or the application. It will include the memory occupied<br />

by the application along with a pseudo identity, and if the AD charges the user according<br />

to the space usage then this data will be used to calculate the charge. Finally, the SC<br />

uses the one-time SID AD−SC that is generated in previous protocol runs with the AD,<br />

to provide authentication credentials and possibly avoid a DoS attack on the AD's server.<br />

The SID is an abbreviation <strong>for</strong> session identier and we have discussed it in section 4.7.5.<br />

On receipt, the AD veries the SC i ′ and associated SID AD−SC . After verication, it will<br />

retrieve the long-term shared keys, verify the MAC, and decrypt the message. Depending<br />

upon the AD's policy, it will proceed with the charge that might include billing the user's<br />

account or credit/debit card.<br />

STCP ACA -8. AD : ActApp = AppDoD||AD i ||SC i ||U i ||N AD ||N<br />

SC<br />

′<br />

AD : pd = chm||chv||pm<br />

AD : tc = Sign AD (pd||ActApp)<br />

AD : SC i ′ = h(AD i ||SC i ||N ′ SC ||N AD)<br />

AD : SID ′ SC−AD = f k AD<br />

(SC i ′||AD i ||SC i )<br />

AD : mE = ek SC−AD (tc||CertS AD ||SC i ′||SID ′ AD−SC )<br />

AD → SC : mE||f mkSC−AD (mE)||SID AD−SC<br />

145

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!