Application-binding protocol in the user centric smart card ownership model

  • Authors:
  • Raja Naeem Akram;Konstantinos Markantonakis;Keith Mayes

  • Affiliations:
  • Information Security Group Smart card Centre, Royal Holloway, University of London, Egham, Surrey, United Kingdom;Information Security Group Smart card Centre, Royal Holloway, University of London, Egham, Surrey, United Kingdom;Information Security Group Smart card Centre, Royal Holloway, University of London, Egham, Surrey, United Kingdom

  • Venue:
  • ACISP'11 Proceedings of the 16th Australasian conference on Information security and privacy
  • Year:
  • 2011

Quantified Score

Hi-index 0.00

Visualization

Abstract

The control of the application choice is delegated to the smart card users in the User Centric Smart Card Ownership Model (UCOM). There is no centralised authority that controls the card environment, and it is difficult to have implicit trust on applications installed on a smart card. The application sharing mechanism in smart cards facilitates corroborative and interrelated applications to co-exist and augment each other's functionality. The already established application sharing mechanisms (e.g. in Java Card and Multos) do not fully satisfy the security requirements of the UCOM that require a security framework that provides runtime authentication, and verification of an application. Such a framework is the focus of this paper. To support the framework, we propose a protocol that is verified using CasperFDR. In addition, we implemented the protocol and provide a performance comparison with existing protocols.