06.11.2014 Views

A User Centric Security Model for Tamper-Resistant Devices

A User Centric Security Model for Tamper-Resistant Devices

A User Centric Security Model for Tamper-Resistant Devices

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

1.4 Contributions<br />

the UCTD manufacturing, to the application download and execution, to decommissioning<br />

at the end of the UCTD's lifetime. The main contribution of the thesis is the development<br />

of a user centric framework <strong>for</strong> tamper-resistant security-sensitive devices. To accomplish<br />

this, we propose several changes to existing smart card architecture, including changes to<br />

the application management framework, the application download protocols, the smart<br />

card rewall mechanism, and nally the application execution environment.<br />

We propose a new architecture <strong>for</strong> the smart card plat<strong>for</strong>m, including the remote attestation<br />

and security assurance mechanism. These changes will enable an SP to ascertain<br />

whether the current state of a plat<strong>for</strong>m is trustworthy. Furthermore, we propose a framework<br />

to securely backup the contents of a smart card and restore them (when required)<br />

to any other smart card. This latter mechanism allows a rapid recovery if the existing<br />

smart card is stolen or corrupted (i.e. cannot work), and also facilitates migration from<br />

one device to another.<br />

Issuance<br />

(Chapters 3-4)<br />

Decommission<br />

(Chapter 9)<br />

Application<br />

Acquisition<br />

(Chapters 5-6)<br />

Execution<br />

(Chapter 8)<br />

Localisation<br />

(Chapter 7)<br />

Figure 1.1: Life cycle of UCTDs in relation to a user and an application<br />

The life cycle stages of a UCTD in relation to its provision of dierent functionality or<br />

features to the respective user or SP are shown in gure 1.1. Each depicted stage of the<br />

UCTD also has a corresponding chapter or chapters in the thesis.<br />

The rst stage in the life cycle of a UCTD is the issuance phase that includes manufacturing<br />

and issuance of the UCTDs along with the ownership acquisition by the users.<br />

In the second stage referred as Application Acquisition, the user requests an SP to lease its<br />

application(s) to the acquired UCTD. This process encompasses the dynamic establishment<br />

of a trust relationship between the SP and the UCTD along with the downloading of the<br />

(requested) application.<br />

27

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!