06.11.2014 Views

A User Centric Security Model for Tamper-Resistant Devices

A User Centric Security Model for Tamper-Resistant Devices

A User Centric Security Model for Tamper-Resistant Devices

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

10.1 Summary and Conclusions<br />

giving the user authentication credentials <strong>for</strong> these SPs. We discuss the card management<br />

architectures proposed by GlobalPlat<strong>for</strong>m, and Multos. The rationale behind not<br />

discussing the Java Card was to do with its support <strong>for</strong> the GlobalPlat<strong>for</strong>m. We briey described<br />

the shortfalls of both GlobalPlat<strong>for</strong>m and Multos card management architectures.<br />

Subsequently, we modied the architecture specied by GlobalPlat<strong>for</strong>m in a way that supported<br />

the application installation mechanism of the UCOM. Later, we also proposed the<br />

possible attacks that are unique to the UCOM proposal along with how a smart card can<br />

adequately implement protection against them.<br />

Based on the card management architecture, we proceeded with the application installation<br />

process. The installation process rst requires a secure channel to be established between<br />

a smart card and an SP. It also requires that an SP is able to ascertain the trustworthiness<br />

of the smart card to enable the SP to verify whether the given smart card supports the<br />

SP's security policy <strong>for</strong> the application lease. For this purpose, we dened the security and<br />

operational requirements <strong>for</strong> a Secure and Trusted Channel Protocol (STCP) <strong>for</strong> UCOMbased<br />

smart cards. We proposed three protocols that satisfy the UCOM requirements and<br />

these protocols were subjected to the CasperFDR tool <strong>for</strong> a mechanical <strong>for</strong>mal analysis. We<br />

per<strong>for</strong>med the mechanical <strong>for</strong>mal analysis on the STCPs <strong>for</strong> the sake of completeness. In<br />

addition to this, we provided per<strong>for</strong>mance results of test implementations and compared<br />

them with existing protocols. Our proposed STCPs not only satised the security and<br />

operational requirements of the UCOM but also provided an ecient per<strong>for</strong>mance. After<br />

establishing a secure and trusted channel protocol, an SP may proceed with the application<br />

download to the requesting smart card.<br />

A downloaded application on a smart card may establish data and resource sharing with<br />

other applications. Both Java Card and Multos support the application sharing mechanism;<br />

however, their proposals take two opposite approaches. We discussed both approaches and<br />

detailed the reasons why they fail the UCOM's requirements. Subsequently, we proposed a<br />

smart card rewall mechanism based on the Java Card application sharing mechanism that<br />

supports the UCOM's requirements. To support this proposal, a dynamic mechanism is<br />

needed that not only authenticates the applications but also ascertains whether the current<br />

states of the applications are secure. For this purpose, we proposed a symmetric key-based<br />

protocol that a client and server application can use to authenticate and validate each<br />

other's state. Later, we extended the application sharing mechanism that traditionally<br />

only supports sharing between the applications on a single smart card, to one that allows<br />

applications installed on dierent smart cards to share their data and resources. We<br />

termed this extension as Cross-Device Application Sharing and to support this proposal<br />

we detailed two protocols that establish relationships between individual smart cards and<br />

applications. All proposed protocols were subjected to mechanical <strong>for</strong>mal analysis by<br />

CasperFDR and their test per<strong>for</strong>mance measures were provided along with comparisons<br />

with other protocols. Once an application is installed and it has established any sharing<br />

227

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!