06.11.2014 Views

A User Centric Security Model for Tamper-Resistant Devices

A User Centric Security Model for Tamper-Resistant Devices

A User Centric Security Model for Tamper-Resistant Devices

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

6.6 Analysis of the Proposed Protocols<br />

This is necessary to avoid the SP committing memory and computational resources, unless<br />

the communicating smart card is authenticated to the SP.<br />

6.6.1.4 Privacy<br />

The privacy preservation goal (SOG-15) requires that the privacy of the user is protected.<br />

This requirement does not include privacy <strong>for</strong> the SP as part of their business model is to<br />

advertise their presence and identity (i.e. web servers). There<strong>for</strong>e, the privacy requirement<br />

is restricted to the preservation of the user's identity and her smart card's identity. The<br />

smart card's identity is protected to avoid traceability. By traceability, we mean that if a<br />

user acquires an application from a malicious SP then the malicious SP knows the identity<br />

of the smart card and the user. In the future, if the user tries to acquire an application<br />

from another SP using the same smart card, the malicious SP can trace ownership of the<br />

card back to the user. In the proposed protocol, we do not send any in<strong>for</strong>mation that can<br />

be uniquely attached to a particular user or a smart card in plaintext. All communications<br />

that include the identities and cryptographic certicates are encrypted.<br />

However, if a user always gets online through a permanent connection (i.e. a xed Internet<br />

Protocol address) then a malicious user can trace the communication to a user, but only<br />

if the malicious user has previously recorded the association of the IP address with the<br />

respective user. In such a scenario, privacy preservation is dicult to maintain in the<br />

restricted framework of the secure channel protocol; there<strong>for</strong>e, the proposed STCP does<br />

not provide protection against traceability under xed, uniquely associated IP addresses<br />

to users.<br />

6.6.1.5 Simulator Attack Resilience<br />

The proposed protocols provide protection in relation to the simulator attack by relying<br />

on the smart card attestation (section 4.4.3), trustworthiness, and eectiveness of the evaluation<br />

laboratory. The certication ensures that the smart card is tamper-resistant, and<br />

it is highly unlikely that a malicious user can retrieve the smart card signature key pair.<br />

There<strong>for</strong>e, the validation proof cannot be generated by a simulated environment, and so<br />

if an SP receives a genuine validation proof then it can be certain that it is generated by<br />

a genuine smart card. Furthermore, in the online attestation mechanism the card manufacturer<br />

dynamically veries the current state of the smart card and issues a compliance<br />

certicate that the smart card sends to the respective SP.<br />

This will in theory give the assurance to the SP that the smart card with which it is<br />

communicating is not a simulator, and that the current state of the smart card is as it<br />

149

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!