Recent Changes - Search:

History:
(:tracetrails:)


edit SideBar


(redirected from Communications.TrustedService)

Keywords: Advanced SIM functionality, new application areas for SIM cards, other form factors

Paper

News

Description (draft)

Some services need a relation between a virtual identity and the physical world. This Master thesis aims to study mechanism for making this relation. This proposal makes use of the SIM-card as a secure tamper-proof container of the identities, and the Network Operator as a reliable Identification Provider. The mechanisms for making the relation between the secure element containing the identity and the physical world could e.g. be:

  • GPS/GSM and other LBS for verifying position
  • Methods for securing close proximity between entities

One application that could benefit from solution like this is a hitchhiking organizer, where car owners can register planned trips, and hitch hikers can search for possible hikes. This type of application should have some kind of trust mechanisms built into them. One possibility is to use ratings of drivers and passengers based on experience. But this approach is again vulnerable against attackers trying to insert false information. In order to make the service more trustworthy some kind context information may be used to check that the information provided by the user is likely to be true. One possibility is to use information about the user's position to check that hitch hiker and the car driver have been in the same car during the trip.

Content of the thesis

Theoretical

Establish future SIM scenarios

  • Describe SIM scenarios as hardware, part of the mobile phone (secure element) or sw/hw on sensors
  • Review the trends introduced by the javacard 3.0 and its with other java virtual machine specifications
  • Evaluation of capabilities, examples of application areas
    • Tamperproof hardware-protection of user identity
    • ...

Perform an assessment of SIM-based identity management schemes

  • Describe capabilities of eIdentities (example Austria)
  • Explain SIM-based eID generation
  • Assess Secure eID import to SIM
  • Compare possible SIM Identity management solutions to selected identity standards

Establish a context-aware trust identification

  • Establish trust identifier/factor/measure based on trust modelling
  • Analyse on how context information (here: location) can serve as input parameter for the trust model
  • Model the trust identifier built on context information e.g. location (modelling the build trust level based on the accuracy of the sensor, micro-location or macro-location – GPS/WLAN/Base location or other).
  • Enhancing the trust model through combination of context information with the information from the SIM/Identity Providers.

Implementation and Evaluation

Application scenario

  • Hitch-hiking, implication of different SIM form factors

Implementations

  • Analysis of sensor-based versus SIM-based implementation
  • Establish functional architecture
  • Potential Implementation
    • Prototyping on the Sunspot Platform emulating a SIM card
    • Real phone application
    • Sensor connectivity to phone and SIM card
    • alternative: Python for N95 with accelerometer
  • Evaluation

Conclusion
References

Goals and plan of progress

  • 14 Dec 2009 Title registration
  • 15 Jan 2009 NTNU registration of problem description
  • 15 Feb 2009 confirmed problem description
  • 10 Jun 2009 delivery of thesis

Milestones

  • M1 (15 Feb) ...

Contacts: (please update your info at People) Thomas Carlyle, , m: +47 94483061 (NEW norwegian number)
Steinar Brede, , m: 992 86 867
Karin Sallhammar, , m: 4821 5585
Kjetil Haslum, , m: 9760 9300
Josef Noll, , p: 6484 4745, m: 9083 8066
Sarfraz Alam, , p: 6484 4754, m: 4639 3153
Øivind Kure,


Categories:SIM, Identity, Mobile Services

Edit - History - Print - Recent Changes - Search
Page last modified on January 22, 2010, at 10:04 AM EST