A novel consumer-centric card management architecture and potential security issues

Multi-application smart card technology has gained momentum due to the Near Field Communication (NFC) and smart phone revolution. Enabling multiple applications from different application providers on a single smart card is not a new concept. Multi-application smart cards have been around since the late 1990s; however, uptake was severely limited. NFC has recently reinvigorated the multi-application initiative and this time around a number of innovative deployment models are proposed. Such models include Trusted Service Manager (TSM), User Centric Smart Card Ownership Model (UCOM) and GlobalPlatform Consumer-Centric Model (GP-CCM). In this paper, we discuss two of the most widely accepted and deployed smart card management architectures in the smart card industry: GlobalPlatform and Multos. We explain how these architectures do not fully comply with the UCOM and GP-CCM. We then describe our novel flexible consumer-centric card management architecture designed specifically for the UCOM and GP-CCM frameworks, along with ways of integrating the TSM model into the proposed card management architecture. Finally, we discuss four new security issues inherent to any architecture in this context along with the countermeasures for our proposed architecture.

[1]  Amy P. Felty,et al.  Proceedings of the 10th International Conference on Theorem Proving in Higher Order Logics , 1997 .

[2]  Keith Mayes,et al.  Firewall Mechanism in a User Centric Smart Card Ownership Model , 2010, CARDIS.

[3]  Keith Mayes,et al.  A Privacy Preserving Application Acquisition Protocol , 2012, 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications.

[4]  Keith Mayes,et al.  Simulator Problem in User Centric Smart Card Ownership Model , 2010, 2010 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing.

[5]  Keith Mayes,et al.  A Paradigm Shift in Smart Card Ownership Model , 2010, 2010 International Conference on Computational Science and Its Applications.

[6]  Eric Vétillard,et al.  Combined Attacks and Countermeasures , 2010, CARDIS.

[7]  Keith Mayes,et al.  Coopetitive Architecture to Support a Dynamic and Scalable NFC Based Mobile Services Architecture , 2012, ICICS.

[8]  Erik Poll,et al.  Malicious Code on Java Card Smartcards: Attacks and Countermeasures , 2008, CARDIS.

[9]  Konstantinos Markantonakis,et al.  Rethinking the Smart Card Technology, Invited Paper , 2014 .

[10]  David A. Basin,et al.  Verified Bytecode Model Checkers , 2002, TPHOLs.

[11]  Ross J. Anderson Can We Fix the Security Economics of Federated Authentication? , 2011, Security Protocols Workshop.

[12]  Damien Sauveron,et al.  Some security problems raised by open multiapplication smart cards , 2005 .

[13]  Keith Mayes,et al.  Location Based Application Availability , 2009, OTM Workshops.

[14]  Jean-Louis Lanet,et al.  Smart Card Research and Advanced Application, 9th IFIP WG 8.8/11.2 International Conference, CARDIS 2010, Passau, Germany, April 14-16, 2010. Proceedings , 2010, CARDIS.

[15]  Joachim Posegga,et al.  Java Bytecode Verification by Model Checking , 1999, CAV.

[16]  Keith Mayes,et al.  A Secure and Trusted Channel Protocol for the User Centric Smart Card Ownership Model , 2013, 2013 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications.

[17]  Damien Sauveron,et al.  Multiapplication smart card: Towards an open smart card? , 2009, Inf. Secur. Tech. Rep..

[18]  Patel,et al.  Information Security: Theory and Practice , 2008 .

[19]  Keith Mayes,et al.  Remote Attestation Mechanism based on Physical Unclonable Functions , 2013 .

[20]  Xavier Leroy On-Card Bytecode Verification for Java Card , 2001, E-smart.

[21]  Konstantinos Markantonakis,et al.  Rethinking the Smart Card Technology , 2014, HCI.

[22]  Keith Mayes,et al.  A Dynamic and Ubiquitous Smart Card Security Assurance and Validation Mechanism , 2010, SEC.

[23]  Keith Mayes,et al.  Remote Attestation Mechanism for User Centric Smart Cards Using Pseudorandom Number Generators , 2013, ICICS.

[24]  Marc F. Witteman,et al.  Reverse Engineering Java Card Applets Using Power Analysis , 2007, WISTP.

[25]  Xavier Leroy,et al.  Bytecode verification on Java smart cards , 2002 .

[26]  Christian Steger,et al.  A Defensive Virtual Machine Layer to Counteract Fault Attacks on Java Cards , 2013, WISTP.

[27]  Keith Mayes,et al.  Recovering from a Lost Digital Wallet , 2013, 2013 IEEE 10th International Conference on High Performance Computing and Communications & 2013 IEEE International Conference on Embedded and Ubiquitous Computing.

[28]  Christian Steger,et al.  A defensive Java Card virtual machine to thwart fault attacks by microarchitectural support , 2013, 2013 International Conference on Risks and Security of Internet and Systems (CRiSIS).

[29]  Keith Mayes,et al.  Building the Bridges -- A Proposal for Merging Different Paradigms in Mobile NFC Ecosystem , 2012, 2012 Eighth International Conference on Computational Intelligence and Security.