06.11.2014 Views

A User Centric Security Model for Tamper-Resistant Devices

A User Centric Security Model for Tamper-Resistant Devices

A User Centric Security Model for Tamper-Resistant Devices

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

6.6 Analysis of the Proposed Protocols<br />

with the activation of the downloaded application only after this message is received by<br />

the smart card.<br />

The SP will only register the leased application to access the SP's services once it is<br />

activated by the smart card. On activation, the application dials back to the SP's server.<br />

On receipt of the conrmation that the application is active, the SP will sanction the<br />

application to access the provided services. The contractual agreement messages provide<br />

the assurance that a smart card and an SP have communicated with each other through<br />

the STCP ACA . During this protocol, the smart card assures the SP about its security<br />

and reliability mechanisms, and they are accepted by the SP. The SP has then leased its<br />

application, which was downloaded onto the smart card without any error.<br />

6.6.2 CasperFDR Analysis of the Proposed Protocols<br />

The intruder's capability modelled in the Casper scripts (appendices B3, B4, and B5) <strong>for</strong><br />

the proposed protocol is as below:<br />

1. An intruder can masquerade as any application's identity in the network.<br />

2. An intruder is not allowed to masquerade as an SP or TEM.<br />

3. An intruder application has a trust relationship with the TEM.<br />

4. An intruder can read the messages transmitted by each entity in the network.<br />

5. An intruder cannot inuence the internal processes of a communicating entity (agent)<br />

in the network.<br />

The security specication <strong>for</strong> which the CasperFDR evaluates the network is as shown<br />

below. The listed specications are dened in the #Specication section of appendices B3,<br />

B4, and B5:<br />

1. The protocol run is fresh and both applications were alive.<br />

2. The key generated by the SP and SC is not known to the intruder.<br />

3. Entities undergo mutual authentication and key assurance at the conclusion of the<br />

protocol.<br />

4. The long term keys of communicating entities are not compromised.<br />

5. The user's identity is not revealed to the intruder.<br />

151

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!