06.11.2014 Views

A User Centric Security Model for Tamper-Resistant Devices

A User Centric Security Model for Tamper-Resistant Devices

A User Centric Security Model for Tamper-Resistant Devices

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

7.7 Analysis of the Proposed Protocols<br />

7.7.3 CasperFDR Analysis of the Proposed Protocols<br />

The intruder's capability modelled in the Casper scripts (appendices B.6, B.7, and B.8)<br />

<strong>for</strong> the proposed protocol is shown below:<br />

1. An intruder can masquerade as any entity in the network.<br />

2. An intruder can read the messages transmitted by each entity in the network.<br />

3. An intruder cannot inuence the internal process of an agent in the network.<br />

The security specication <strong>for</strong> which the CasperFDR evaluates the network is shown below.<br />

The listed specications are dened in the #Specication section of appendices B.6, B.7,<br />

and B.8:<br />

1. The protocol run is fresh and both applications/smart cards are alive.<br />

2. The keys generated during the protocol run are known only to the authenticated<br />

participants of the protocol and an adversary cannot retrieve the session keys.<br />

3. Entities mutually authenticate each other and have mutual key assurance at the<br />

conclusion of the protocol.<br />

4. Long-term keys of communicating entities are not compromised.<br />

The protocol description dened in the Casper scripts is a simplied representation of the<br />

proposed protocols. The o-card agents like the SPs of client and server applications are<br />

not modelled in the Casper script as they do not play an active role in the protocol run.<br />

The CasperFDR tool evaluated the protocol and did not nd any attack(s).<br />

7.7.4 Implementation Results and Per<strong>for</strong>mance Measurements<br />

The overall architecture of the test-bed is the same as the architecture discussed in section<br />

4.8.3, consisting of a laptop and two Java Cards (e.g. C1 and C2). We executed individual<br />

protocol <strong>for</strong> 1000 iterations to get the per<strong>for</strong>mance measurements.<br />

Our implementation model <strong>for</strong> the ABPL is based on three applets taking the roles of<br />

the TEM, client, and server application on a Java Card (16bit smart card) that take<br />

in total 8938 bytes. At the time of testing, we did not have access to an SCOS that<br />

184

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!