06.11.2014 Views

A User Centric Security Model for Tamper-Resistant Devices

A User Centric Security Model for Tamper-Resistant Devices

A User Centric Security Model for Tamper-Resistant Devices

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

2.3 Candidates <strong>for</strong> <strong>User</strong> <strong>Centric</strong> <strong>Tamper</strong>-<strong>Resistant</strong> Device<br />

2.3.5 GlobalPlat<strong>for</strong>m Trusted Execution Environment (TEE)<br />

The TEE is GlobalPlat<strong>for</strong>m's initiative [23, 54, 65] <strong>for</strong> mobile phones, set-top boxes, utility<br />

meters, and payphones. GlobalPlat<strong>for</strong>m denes a specication <strong>for</strong> interoperable secure<br />

hardware, which is based on the GlobalPlat<strong>for</strong>m's experience in the smart card industry.<br />

It does not dene any particular hardware, which can be based on either a typical secure<br />

element or any of the previously discussed tamper-resistant devices. The rationale <strong>for</strong><br />

discussing the TEE as part of the candidate devices is to provide a complete picture.<br />

The underlying ownership of the TEE device still predominantly resides with the issuing<br />

authority, which is similar to the GlobalPlat<strong>for</strong>m's specication <strong>for</strong> the smart card industry<br />

[30].<br />

2.3.6 Trusted Personal <strong>Devices</strong><br />

The term Trusted Personal <strong>Devices</strong> (TPD) was coined by the Integrated secure plat<strong>for</strong>m<br />

<strong>for</strong> the interactive Trusted Personal <strong>Devices</strong> (InspireD) project [66]. Similar to our proposal,<br />

the architecture <strong>for</strong> the TPD is based on smart card technology. The architecture<br />

of the TPD is similar to that of the smart card, with the exception that is has dierent<br />

<strong>for</strong>m factors that include SIM cards, Secure Digital (SD) cards, and Universal Serial Bus<br />

(USB) memory sticks [66]. However, the InspireD project recommended that the TPD<br />

to be under the ownership of a centralised authority (i.e. card issuer) and users get the<br />

privilege of choosing whether to use the device or not. <strong>User</strong>s cannot request installation<br />

or deletion of an application. There<strong>for</strong>e, we can say that TPD was in con<strong>for</strong>mance with<br />

the ICOM framework.<br />

2.3.7 Comparative Analysis<br />

In this section, we analyse three questions: i) why use a tamper-resistant device?, ii) why<br />

have a user centric ownership architecture?, and nally iii) why do we not just opt <strong>for</strong> the<br />

TPM (or other devices discussed above)?<br />

In most of the scenarios, a tamper-resistant device is assumed to be in the possession of<br />

a malicious user [5, 6]. This assumption is natural <strong>for</strong> banking, transport, and healthcare<br />

cards. There<strong>for</strong>e, a tamper-resistant device has a physical protection layer to avoid any<br />

intrusion attacks. In addition, these devices require an adequate hardware protection and<br />

self-protect mechanism to safeguard them from accidental or intentional damage. There<strong>for</strong>e,<br />

a tamper-resistant device provides a secure and reliable plat<strong>for</strong>m that can remain<br />

trustworthy even in the possession of a malicious user. However, just focusing on the tam-<br />

39

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!