7 research outputs found

    Remote attestation mechanism for embedded devices based on physical unclonable functions

    Get PDF
    Remote attestation mechanisms are well studied in the high-end computing environments; however, the same is not true for embedded devices-especially for smart cards. With ever changing landscape of smart card technology and advancements towards a true multi-application platform, verifying the current state of the smart card is significant to the overall security of such proposals. The initiatives proposed by GlobalPlatform Consumer Centric Model (GP-CCM) and User Centric Smart Card Ownership Model (UCOM) enables a user to download any application as she desire-depending upon the authorisation of the application provider. Before an application provider issues an application to a smart card, verifying the current state of the smart card is crucial to the security of the respective application. In this paper, we analyse the rationale behind the remote attestation mechanism for smart cards, and the fundamental features that such a mechanism should possess. We also study the applicability of Physical Unclonable Functions (PUFs) for the remote attestation mechanism and propose two algorithms to achieve the stated features of remote attestation. The proposed algorithms are implemented in a test environment to evaluate their performance. © 2013 The authors and IOS Press. All rights reserved

    A SURVEY ON ENCRYPTION ALGORITHMS AND PROTOCOLS IN SMART CARD FOR USER CENTRIC OWNERSHIP MODEL

    Get PDF
    User Centric Ownership Model (UCOM) enables the smart card users to install/delete application they prefer in their smart card. UCOM provides smart card users to have any number of applications installed on their smart cards. Though UCOM provides flexibility for the smart card users, it lacks centralized authority. UCOM creates major problem if the user has more than one application installed in his/her smart card.  Smart card may contain applications from the provider that may interrupt the proper working of the neighbor applications.  Smart card user may hack his way to a known aboutapplication through a smart card simulator. Thus, there is no security for an application in the smart card for UCOM model. This survey paper includes background and motivation about the available encryption algorithms for smart cards such as RSA, ECC, AES, DES, T-DES, ECDSA and the smart card protocols which can be used to overcome the problem of security for the applications in smart card for UCOM model

    A Paradigm Shift in Smart Card Ownership Model

    No full text
    corecore