Remote Attestation Mechanism for User Centric Smart Cards using Pseudorandom Number Generators

Raja Naeem Akram, Konstantinos Markantonakis, Keith Mayes

Research output: Chapter in Book/Report/Conference proceedingConference contribution

7 Citations (Scopus)

Abstract

User Centric Smart Card Ownership Model (UCOM) gives the ``freedom of choice'' of respective applications to the smart card users. The user-centric architecture requires a trusted entity to be present on the smart card to provide security assurance and validation to the requesting application providers. In this paper, we propose the inclusion of a trusted computing platform for smart cards that we refer as the Trusted Environment Execution Manager (TEM). This is followed by the rationale behind the changes to the traditional smart card architecture to accommodate the remote security assurance and validation mechanism. We propose an attestation protocol that provides an on-demand security validation of a smart card by its respective manufacturer. Finally, the attestation protocol is informally analysed, and its test implementation and performance measurements are presented.
Original languageEnglish
Title of host publicationInternational Conference on Information and Communications Security (ICICS 2013)
EditorsS. Qing
Place of PublicationBeijing, China
PublisherSpringer International Publishing AG
Pages151-166
Number of pages16
Publication statusPublished - 20 Nov 2013
EventICICS: International Conference on Information and Communications Security - Beijing, China
Duration: 20 Nov 201322 Nov 2013
Conference number: 15th

Conference

ConferenceICICS
Abbreviated titleICICS 2013
CountryChina
CityBeijing
Period20/11/1322/11/13

Fingerprint Dive into the research topics of 'Remote Attestation Mechanism for User Centric Smart Cards using Pseudorandom Number Generators'. Together they form a unique fingerprint.

  • Cite this

    Akram, R. N., Markantonakis, K., & Mayes, K. (2013). Remote Attestation Mechanism for User Centric Smart Cards using Pseudorandom Number Generators. In S. Qing (Ed.), International Conference on Information and Communications Security (ICICS 2013) (pp. 151-166). Springer International Publishing AG. https://link.springer.com/content/pdf/10.1007%2F978-3-319-02726-5_12.pdf