06.11.2014 Views

A User Centric Security Model for Tamper-Resistant Devices

A User Centric Security Model for Tamper-Resistant Devices

A User Centric Security Model for Tamper-Resistant Devices

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

2.5 Case Studies<br />

an enrolment process with the Remote Application Enrolment Server (RAES). The RAES<br />

enables the secure element to establish a secure binding <strong>for</strong> the Remote Application Server<br />

(RAS). The secure binding will be used in future to establish a connection with the RAS<br />

to access the remote application(s).<br />

As a user enters the vicinity of a SAP, the event-triggering software sends an alert to<br />

the behaviour analyser. The behaviour analyser calculates the probability of the user<br />

accessing the service. If the user is predicted to use the service, the behaviour analyser<br />

requests the Smart Card Web Server (SCWS) to establish a connection over the internet<br />

with the corresponding RAS and act as a bridge between the terminal and the remote<br />

application(s).<br />

When the user waves the mobile phone near the SAP to access service(s), the SAP might<br />

challenge the mobile phone to authenticate the user (application). The challenge is sent to<br />

the remote application by the secure element. Once the remote application has authenticated<br />

the user, the terminal will provide the requested service(s).<br />

2.5 Case Studies<br />

In this section, we discuss a non-exhaustive list of case studies where UCTD can provide<br />

exibility, and ubiquity to the existing security and privacy architectures.<br />

2.5.1 One Card - All Services<br />

<strong>User</strong> ownership enables a user to establish relationships with SPs ubiquitously, which is<br />

referred as dynamism. Consider a scenario in the proposed TSM model in which a user who<br />

travels extensively around the world (<strong>for</strong> business or pleasure) acquires a smart card from<br />

a TSM in her country of origin. When she travels, she wants to access services that are<br />

specic to the visiting country, but she cannot download them onto her smart card. The<br />

reasons behind this might be that the services in the visiting country are not associated<br />

with (i.e. are not part of) the TSM from which she acquired the smart card. To further<br />

explain the scenario, consider Oyster Card [72], which a user can use in London to access<br />

local transport services but at the time of writing, it cannot be used as an e-purse. In<br />

contrast, the Octopus Card [73], which a user can use in Hong Kong <strong>for</strong> local transport<br />

services, can also be used at groceries, confectioneries, and restaurants. Our user from<br />

London would still have to queue to get the Octopus Card when she reached Hong Kong.<br />

As we pointed out, she travels extensively around the world and she may not derive a great<br />

deal of benet from the TSM architecture [42, 74].<br />

47

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!