Nothing Special   »   [go: up one dir, main page]

skip to main content
research-article

Trusting Mobile User Devices and Security Modules

Published: 01 February 1997 Publication History

Abstract

The market for devices like mobile phones, multifunctional watches, and personal digital assistants is growing rapidly. Most of these mobile user devices need security for their prospective electronic commerce applications. While new technology has simplified many business and personal transactions, it has also opened the door to high-tech crime. In this article, we investigate design options for mobile user devices that are used in legally significant applications. Such applications authorize transactions: mobile phone calls, access to an office or car, electronic payment in stores, retrieval of stored medical data, and access to information on portable computers. Digital signatures-the electronic equivalent of handwritten signatures-are at the core of most of these applications and are explained briefly in the "Digital Signatures" sidebar. A trustworthy mobile user device should suit its purpose well and have credible quality. Because mobile user devices act on someone's behalf, we use the analogy of agents to describe approaches to security. There are three types of agent trustworthiness: Personal-agent trust. Here, the device must act according to the user's wishes while it is in the user's hands. For example, it should not sign unintended statements or unintentionally delete electronic money. Captured-agent trust. In this case, the user is protected even if the mobile user device is lost, stolen, or given away (inserted into a point-of-sale terminal or sent away for maintenance). For example, the finder or thief should not be able to sign statements in the legitimate user's name. Undercover-agent trust. In this case the mobile user devices will protect a third party from the device's legitimate user. For example, in prepaid offline payment systems users have so-called "electronic cash" in their mobile user devices, which they can use without connecting to a bank. The bank wants the mobile user device to prevent its legitimate user from "spending" the same bit string in several shops. Contrary to popular belief, undercover-agent trust is not needed in many applications, including online payment systems and general signature applications. A mobile user device by itself may not be able to keep data secret or uncorrupted-it may not be tamper-resistant. A tamper-resistant device is called a security module, whether the security mechanism is on a separate device or incorporated into the mobile user device itself. Such devices secure "mobile" applications and applications on stationary devices like PCs and public kiosks, if all security-relevant actions are controlled via the trustworthy mobile device.

References

[1]
Common Criteria Editorial Board, "Common Criteria for Information Technology Security Evaluation," Version 1.0, Jan. 1996; ftp.cse.dnd.ca/pub/criteria/CC1.0/.
[2]
R. Anderson, "Why Cryptosystems Fail," Comm. ACM, Nov. 1994, pp. 32-40.
[3]
J. Brown, "Roll Up for the Flexible Transistor," New Scientist, Sept. 1994, p. 5.
[4]
D.W. Davies and W.L. Price, Security for Computer Networks, An Introduction to Data Security in Teleprocessing and Electronic Funds Transfer, 2nd Ed., John Wiley & Sons, New York, 1989, pp. 169-207.
[5]
B. Miller, "Vital Signs of Identity," IEEE Spectrum, Feb. 1994, pp. 22-30.
[6]
S. Brands and D. Chaum, "Distance-Bounding Protocols," Proc. Eurocrypt '93, Springer-Verlag, Berlin, 1994, pp. 344-359.
[7]
M. Abadi, et al., "Authentication and Delegation with Smart-Cards," Science of Computer Programming, Oct. 1993, pp. 93-113.
[8]
S. Brands, "Untraceable Off-line Cash in Wallet with Observers," Proc. Crypto '93, Springer-Verlag, Berlin, 1994, pp. 302-318.
[9]
D. Chaum and T. P. Pedersen, "Wallet Databases with Observers," Proc. Crypto '92, Springer-Verlag, Berlin, 1993, pp. 89-105.
[10]
S. Weingart, "Physical Security for the μABYSS System," Proc. 1987 IEEE Symp. Security and Privacy, Oakland, Calif., pp. 52-58.
[11]
W. Myers, "On Trial at the Summer Olympic Games: Smart Cards," Computer, July 1996, pp. 88-91.
[12]
R. Anderson and M. Kuhn, "Tamper Resistance—A Cautionary Note," Second Usenix Electronic Commerce Workshop, Oakland, Calif., Nov. 1996, pp. 1-11.
[13]
B. Schneier, Applied Cryptography: Protocols, Algorithms, and Source Code in C, John Wiley & Sons, New York, 1996.

Cited By

View all
  • (2020)kUBI: A Framework for Privacy and Transparency in Sensor-Based Business Models for Consumers: A Pay-How-You-Drive ExampleComputer Security10.1007/978-3-030-66504-3_7(114-132)Online publication date: 14-Sep-2020
  • (2019)Energy Efficient Data Encryption Techniques in SmartphonesWireless Personal Communications: An International Journal10.1007/s11277-018-5920-1106:4(2023-2035)Online publication date: 1-Jun-2019
  • (2008)Security and identification indicators for browsers against spoofing and phishing attacksACM Transactions on Internet Technology10.1145/1391949.13919508:4(1-36)Online publication date: 6-Oct-2008
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image Computer
Computer  Volume 30, Issue 2
February 1997
100 pages

Publisher

IEEE Computer Society Press

Washington, DC, United States

Publication History

Published: 01 February 1997

Qualifiers

  • Research-article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 30 Nov 2024

Other Metrics

Citations

Cited By

View all
  • (2020)kUBI: A Framework for Privacy and Transparency in Sensor-Based Business Models for Consumers: A Pay-How-You-Drive ExampleComputer Security10.1007/978-3-030-66504-3_7(114-132)Online publication date: 14-Sep-2020
  • (2019)Energy Efficient Data Encryption Techniques in SmartphonesWireless Personal Communications: An International Journal10.1007/s11277-018-5920-1106:4(2023-2035)Online publication date: 1-Jun-2019
  • (2008)Security and identification indicators for browsers against spoofing and phishing attacksACM Transactions on Internet Technology10.1145/1391949.13919508:4(1-36)Online publication date: 6-Oct-2008
  • (2007)Simplified privacy controls for aggregated servicesProceedings of the 7th international conference on Privacy enhancing technologies10.5555/1779330.1779344(218-232)Online publication date: 20-Jun-2007
  • (2006)DominoProceedings of the 4th international conference on Pervasive Computing10.1007/11748625_10(153-168)Online publication date: 7-May-2006
  • (2004)Data management in mobile peer-to-peer networksProceedings of the Second international conference on Databases, Information Systems, and Peer-to-Peer Computing10.1007/978-3-540-31838-5_1(1-15)Online publication date: 29-Aug-2004
  • (2003)Towards a new paradigm for securing wireless sensor networksProceedings of the 2003 workshop on New security paradigms10.1145/986655.986672(115-121)Online publication date: 13-Aug-2003
  • (2003)Self-Organized Public-Key Management for Mobile Ad Hoc NetworksIEEE Transactions on Mobile Computing10.1109/TMC.2003.11951512:1(52-64)Online publication date: 1-Jan-2003
  • (2003)Personal trusted devices for web servicesMobile Networks and Applications10.1023/A:10222372150268:2(151-157)Online publication date: 1-Apr-2003
  • (2002)Performance analysis of the CONFIDANT protocolProceedings of the 3rd ACM international symposium on Mobile ad hoc networking & computing10.1145/513800.513828(226-236)Online publication date: 9-Jun-2002
  • Show More Cited By

View Options

View options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media