Modelling Smart Card Security Protocols in SystemC TLM
Modelling Smart Card Security Protocols in SystemC TLM
Smart cards are an example of advanced chip technology. They allow information transfer between the card holder and the system over secure networks, but they contain sensitive data related to both the card holder and the system, that has to be kept private and confidential. The objective of this work is to create an executable model of a smart card system, including the security protocols and transactions, and to examine the strengths and determine the weaknesses by running tests on the model. The security objectives have to be considered during the early stages of systems development and design, an executable model will give the designer the advantage of exploring the vulnerabilities early, and therefore enhancing the system security. The Unified Modeling Language (UML) 2.0 is used to model the smart card security protocol. The executable model is programmed in SystemC with the Transaction Level Modeling (TLM) extensions. The final model was used to examine the effectiveness of a number of authentication mechanisms with different probabilities of failure. In addition, a number of probable attacks on the current security protocol were modeled to examine the vulnerabilities. The executable model shows that the smart card system security protocols and transactions need further improvement to withstand different types of security attacks.
978-1-4244-9719-5
637-643
Bushager, Aisha
a2594e87-349b-4fbf-b7fe-834974a51dfb
Zwolinski, Mark
adfcb8e7-877f-4bd7-9b55-7553b6cb3ea0
December 2010
Bushager, Aisha
a2594e87-349b-4fbf-b7fe-834974a51dfb
Zwolinski, Mark
adfcb8e7-877f-4bd7-9b55-7553b6cb3ea0
Bushager, Aisha and Zwolinski, Mark
(2010)
Modelling Smart Card Security Protocols in SystemC TLM.
Embedded and Ubiquitous Computing (EUC), 2010 IEEE/IFIP 8th International Conference on.
.
Record type:
Conference or Workshop Item
(Paper)
Abstract
Smart cards are an example of advanced chip technology. They allow information transfer between the card holder and the system over secure networks, but they contain sensitive data related to both the card holder and the system, that has to be kept private and confidential. The objective of this work is to create an executable model of a smart card system, including the security protocols and transactions, and to examine the strengths and determine the weaknesses by running tests on the model. The security objectives have to be considered during the early stages of systems development and design, an executable model will give the designer the advantage of exploring the vulnerabilities early, and therefore enhancing the system security. The Unified Modeling Language (UML) 2.0 is used to model the smart card security protocol. The executable model is programmed in SystemC with the Transaction Level Modeling (TLM) extensions. The final model was used to examine the effectiveness of a number of authentication mechanisms with different probabilities of failure. In addition, a number of probable attacks on the current security protocol were modeled to examine the vulnerabilities. The executable model shows that the smart card system security protocols and transactions need further improvement to withstand different types of security attacks.
Text
05703589.pdf
- Other
More information
Published date: December 2010
Venue - Dates:
Embedded and Ubiquitous Computing (EUC), 2010 IEEE/IFIP 8th International Conference on, 2010-12-01
Organisations:
EEE
Identifiers
Local EPrints ID: 272297
URI: http://eprints.soton.ac.uk/id/eprint/272297
ISBN: 978-1-4244-9719-5
PURE UUID: eb069503-7a78-41ee-8f0a-b563c068fd40
Catalogue record
Date deposited: 17 May 2011 17:03
Last modified: 15 Mar 2024 02:39
Export record
Contributors
Author:
Aisha Bushager
Author:
Mark Zwolinski
Download statistics
Downloads from ePrints over the past year. Other digital versions may also be available to download e.g. from the publisher's website.
View more statistics