06.11.2014 Views

A User Centric Security Model for Tamper-Resistant Devices

A User Centric Security Model for Tamper-Resistant Devices

A User Centric Security Model for Tamper-Resistant Devices

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

6.6 Analysis of the Proposed Protocols<br />

Communicating entities in the STCPs share signed messages with each other that include<br />

the session in<strong>for</strong>mation, thus providing mutual non-repudiation (SOG-11).<br />

6.6.1.2 Trust Assurance (Trustworthiness)<br />

One of the requirements was to establish a trusted channel between a smart card and<br />

an SP. It is apparent that the required and proposed trusted channel is unidirectional in<br />

relation to the trust assurance and validation. Only smart cards provide the assurance that<br />

their current state is secure and trustworthy to SPs, not the other way around. The reason<br />

behind this is the deployment environment of the UCTD where smart cards are considered<br />

inherently untrustworthy, SPs are not. In the UCOM, a UCTD assumes that an SP can<br />

be malicious but it will result in the lease of a malicious application(s). There<strong>for</strong>e, security<br />

and reliability analysis (e.g. bytecode verication [128, 161]) of the downloaded application<br />

and not of the SP which supplied it is adequate to protect the UCTD. Furthermore, an<br />

adequate protection mechanism implemented by the UCTD runtime environment avoids<br />

malicious runtime activities (discussed in chapter 8)<br />

Establishing a trusted channel between a smart card and an SP is based on the security<br />

and trustworthiness of the SC (section 4.4). The trust in the established protocol session<br />

comes from the assurance that the smart card complies with the evaluated state, which is<br />

certied to be secure and trustworthy by a third party evaluation. The respective SP has<br />

implicit or explicit trust in the third party evaluation.<br />

6.6.1.3 Denial-of-Service Protection<br />

The aim of DoS protection is to provide a level of assurance that the proposed protocols<br />

cannot be used to mount a DoS attack against an SP. This is achieved by a) adding a<br />

session cookie to the protocol messages that serve as the session identier, which includes<br />

the smart card's IP address, and b) by not requiring the SP to per<strong>for</strong>m any public key<br />

operations unless it receives user or plat<strong>for</strong>m authentication.<br />

The session cookie is generated by the SP and it is the smart card's responsibility to include<br />

the cookie in every message. On receiving a message from a smart card, the SP veries the<br />

session cookie and if it belongs to an active session, then it can ascertain that the message<br />

came from a genuine host and not from an entity that is trying to mount a DoS attack.<br />

The second feature requires that the smart card has to provide a signed message (with<br />

either the user- or plat<strong>for</strong>m-key) be<strong>for</strong>e the SP has to per<strong>for</strong>m any heavy computations.<br />

148

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!