06.11.2014 Views

A User Centric Security Model for Tamper-Resistant Devices

A User Centric Security Model for Tamper-Resistant Devices

A User Centric Security Model for Tamper-Resistant Devices

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Appendix A<br />

Description of Protocols Used <strong>for</strong><br />

Comparison<br />

Contents<br />

A.1 Protocol Notation and Terminology . . . . . . . . . . . . . . . . 232<br />

A.2 Station-to-Station (STS) Protocol . . . . . . . . . . . . . . . . . 232<br />

A.3 Aziz-Die (AD) Protocol . . . . . . . . . . . . . . . . . . . . . . 233<br />

A.4 ASPeCT Protocol . . . . . . . . . . . . . . . . . . . . . . . . . . . 234<br />

A.5 Just-Fast-Keying (JFK) Protocol . . . . . . . . . . . . . . . . . . 235<br />

A.6 Trusted Transport Layer Protocol (T2LS) Protocol . . . . . . . 236<br />

A.7 Secure Channel Protocol - 81 (SCP81) Protocol . . . . . . . . . 236<br />

A.8 Markantonakis-Mayes (MM) Protocol . . . . . . . . . . . . . . . 237<br />

A.9 Sirett-Mayes-Markantonakis (SM) Protocol . . . . . . . . . . . 238<br />

In this appendix, we discuss the selected protocols that are used <strong>for</strong> comparison with the our<br />

proposed protocols in this thesis. The protocols are compared on the basis of a pre-dened set<br />

of security and operation goals <strong>for</strong> the UCTD environment. The selection of the protocols<br />

was intentionally kept broad to include well-known (studied) Internet protocols, along with<br />

protocols designed <strong>for</strong> mobile and smart card environments. This selection provides a wellbalanced<br />

comparison with the proposed protocols in terms of pre-dened goals.<br />

231

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!