06.11.2014 Views

A User Centric Security Model for Tamper-Resistant Devices

A User Centric Security Model for Tamper-Resistant Devices

A User Centric Security Model for Tamper-Resistant Devices

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Chapter 4<br />

<strong>User</strong> <strong>Centric</strong> Smart Card<br />

Architecture<br />

Contents<br />

4.1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 80<br />

4.2 Plat<strong>for</strong>m Architecture . . . . . . . . . . . . . . . . . . . . . . . . 80<br />

4.3 Trusted Environment & Execution Manager . . . . . . . . . . . 85<br />

4.4 <strong>Security</strong> Assurance and Validation Mechanism . . . . . . . . . . 90<br />

4.5 Attestation Mechanisms . . . . . . . . . . . . . . . . . . . . . . . 93<br />

4.6 Device Ownership . . . . . . . . . . . . . . . . . . . . . . . . . . . 98<br />

4.7 Attestation Protocol . . . . . . . . . . . . . . . . . . . . . . . . . . 101<br />

4.8 Protocol Analysis . . . . . . . . . . . . . . . . . . . . . . . . . . . 106<br />

4.9 Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 109<br />

In this chapter, we discuss the security and operational architecture of the UCOM supported<br />

plat<strong>for</strong>m, termed the <strong>User</strong> <strong>Centric</strong> Smart Card (UCSC). Subsequently, we detail<br />

the inclusion of a trusted computing plat<strong>for</strong>m <strong>for</strong> smart cards that we refer as the Trusted<br />

Environment & Execution Manager (TEM). This is followed by the rationale behind the<br />

changes to the traditional smart card architecture to accommodate the remote security assurance<br />

and validation mechanism. We propose an attestation protocol that provides an<br />

online security validation of a smart card by its manufacturer. Finally, the attestation protocol<br />

is in<strong>for</strong>mally analysed, and its test implementation and per<strong>for</strong>mance are presented.<br />

79

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!