Adrian Ho Yin Leung (2009) Securing Mobile Services using Trusted Computing.
Full text access: Open
This thesis examines how trusted computing technology can be used to enhance the security of ubiquitous services in mobile environments. It is envisaged that, in a mobile ubiquitous environment, users (through one of their mobile devices and using a range of network access technologies) will be able to seamlessly discover, select, and access a rich offering of services and content from a range of service providers. To realise this vision, it is important that security and privacy issues are addressed from the outset. Initially we introduce the model of mobile ubiquitous computing that underlies the discussions in the remainder of the thesis. We then identify the security requirements for ubiquitous service provision arising in the context of this model. In Part II of the thesis we examine the technology of trusted computing. We consider the effectiveness of a recently proposed attack on one of the trusted computing primitives, namely the Direct Anonymous Attestation protocol, and also examine ways in which the attack can be prevented. We further cryptanalyse a trusted computing based protocol designed to secure the storage and distribution of secrets. In the final part of the thesis, we propose three novel schemes for mobile services security, all using trusted computing as the primary building block. Firstly, we describe a Secure and Private Service Discovery Protocol in which, during the service discovery process, the trustworthiness of a user platform is anonymously authenticated to a service provider, whilst a service provider is simultaneously authenticated to the user. The novel scheme possesses the following desirable properties: user anonymity, service information confidentiality, unlinkability, and rogue blacklisting. We next present a Device Management Framework for Secure Service Delivery. Apart from providing secure service interactions between the service provider and user devices, the framework is designed to reduce the complexity of device security management tasks for users. The framework also protects the interests of service providers by preventing unauthorised credential sharing amongst user devices. One other novel feature of the framework is that compromised devices are self-revoking, hence removing the need for a cumbersome revocation infrastructure. Finally, we construct a Privacy-Preserving Content Watermarking Scheme. Our scheme minimises the reliance on a TTP for privacy protection, as the buyer can generate verifiable pseudonyms on its own. As a result, we are able to reduce communication overheads, and hence improve the overall efficiency compared to existing schemes. In addition, the content provider is able to obtain assurance that a buyer-generated watermark is well-formed. The scheme also provides the following security features: framing resistance, user anonymity, content information confidentiality, unlinkability (even against the TTP), and transaction linkability.
This is a Published version This version's date is: 10/07/2009 This item is peer reviewed
https://repository.royalholloway.ac.uk/items/ac233030-de8d-1d7a-21a1-e3e893fe524d/1/
Deposited by () on 24-Jun-2010 in Royal Holloway Research Online.Last modified on 15-Dec-2010
[1] 3rd Generation Partnership Project, Technical Specication Group Services andSystem Aspects, 3G Security, Valbonne, France. 3GPP TS 33.102 V7.1.0 |Security Architecture (Release 7), December 2006.
[2] 3rd Generation Partnership Project, Technical Speci¯cation Group Servicesand System Aspects, 3G Security, Valbonne, France. 3GPP TS 35.202 V7.0.0| Spec¯cation of the 3GPP Con¯dentiality and Integrity Algorithms, Docu-ment 2: KASUMI Speci¯cation (Release 7), June 2007.
[3] M. Abadi and C. Fournet. Private authentication. Theoretical ComputerScience, 322(3):427{476, 2004.
[4] M. Abadi and A. D. Gordon. A calculus for cryptographic protocols: thespi calculus. In Proceedings of the 4th ACM Conference on Computer andCommunications Security (CCS '97), Zurich, Switzerland, April 1{4, 1997,pages 36{47, New York, NY, USA, 1997. ACM Press.
[5] I. Abbadi. Authorised domain management using location based services. InProceedings of the 4th International Conference on Mobile Technology, Ap-plications & Systems (Mobility'07), Singapore, September 10{12, 2007, pages288{295. ACM Press, 2007.
[6] I. Abbadi. Digital rights management using a master control device. InI. Cervesato, editor, 12th Annual Asian Computing Science Conference Focus-ing on Computer and Network Security (ASIAN'07), Doha, Qatar, December9{11, 2007. Proceedings, volume 4846 of Lecture Notes in Computer Science,pages 126{141. Springer-Verlag, Berlin, 2007.
[7] I. Abbadi and C. J. Mitchell. Digital rights management using a mobile phone.In Proceedings of the Ninth International Conference on Electronic Commerce(ICEC 2007), Minneapolis, MN, USA, August 19{22, 2007, pages 185{194.ACM Press, 2007.
[8] C. Adams and S. Lloyd. Understanding PKI: Concepts, Standards, and De-ployment Considerations. Addison Wesley, second edition, 2002.
[9] A. Alsaid and C. J. Mitchell. Preventing phishing attacks using trusted com-puting technology. In Proceedings of the Sixth International Network Confer-ence (INC 2006), Plymouth, UK, July 11{14, 2006, pages 221{228, 2006.
[10] R. C. Atkinson, J. Irvine, J. Dunlop, and S. Vadagama. The personal dis-tributed environment. IEEE Wireless Communications, 14(2):62{69, April2007.
[11] B. Balache®, L. Chen, S. Pearson, D. Plaquin, and G. Proudler. TrustedComputing Platforms: TCPA Technology in Context. Prentice Hall PTR,Upper Saddle River, New Jersey, 2003.
[12] D. Balfanz, D. K. Smetters, P. Stewart, and H. C. Wong. Talking to strangers:Authentication in ad hoc wireless networks. In Proceedings of Network andDistributed Systems Security Symposium 2002 (NDSS'02), San Diego, Cali-fornia, Feburary 6{8, 2002. The Internet Society, Reston, Virgina, 2002.[13] S. Balfe and E. Gallery. Mobile agents and the deus ex machina. In Proceedingsof the 21st International Conference on Advanced Information Networking andApplications (AINA 2007): 2007 IEEE Symposium on Ubisafe Computing(UBISAFE 2007), Niagara Falls, Canada, May 21-23, 2007, volume 2, pages486{492. IEEE Computer Society, 2007.
[14] S. Balfe, E. Gallery, C. J. Mitchell, and K. G. Paterson. Crimeware and trustedcomputing. In M. Jakobsson and Z. Ramzan, editors, Crimeware: Understand-ing New Attacks and Defenses, chapter 15, pages 457{472. Addison-Wesley,2008.
[15] S. Balfe, E. Gallery, K. G. Paterson, and C. J. Mitchell. Challenges for trustedcomputing. Technical Report RHUL-MA-2008-14, Department of Mathemat-ics, Royal Holloway, University of London, Feburary 2008.
[16] S. Balfe, A. D. Lakhani, and K. G. Paterson. Securing peer-to-peer networksusing trusted computing. In C. J. Mitchell, editor, Trusted Computing, chap-ter 10, pages 271{298. IEE Press, London, 2005.
[17] S. Balfe, A. D. Lakhani, and K. G. Paterson. Trusted computing: Providingsecurity for peer-to-peer networks. In Proceedings of the Fifth InternationalConference on Peer-to-Peer Computing (P2P'05), Konstanz, Germany, Au-gust 31{September 2, 2005, pages 117{124. IEEE Computer Society, Aug-Sep2005.
[18] S. Balfe and A. Mohammed. Final fantasy: Securing on-line gaming withtrusted computing. In B. Xiao, L. T. Yang, J. Ma, C. Muller-Schloer, andY. Hua, editors, 4th International Conference on Autonomic and Trusted Com-puting (ATC 2007), Hong Kong, China, July 11{13, 2007. Proceedings, volume4610 of Lecture Notes in Computer Science, pages 123{134. Springer-Verlag,Berlin, 2007.
[19] S. Balfe and K. G. Paterson. Augmenting internet-based card not presenttransactions with trusted computing. Technical Report RHUL-MA-2006-9v2,
Department of Mathematics, Royal Holloway, University of London, 2006.[20] S. Balfe and K. G. Paterson. e-EMV: Emulating EMV for internet paymentsusing trusted computing technology. Technical Report RHUL-MA-2006-10 v2,Department of Mathematics, Royal Holloway, University of London, 2006.
[21] F. Bao and R. H. Deng. Privacy protection for transactions of digital goods.In S. Qing, T. Okamoto, and J. Zhou, editors, Third International Conferenceon Information and Communications Security (ICICS2001), Xian, China,November 13{16, 2001. Proceedings, volume 2229 of Lecture Notes in Com-puter Science, pages 202{213. Springer-Verlag, Berlin, 2001.
[22] M. Bellare and P. Rogaway. Optimal asymmetric encryption. In R. Ruep-pel, editor, Advances in Cryptology | EUROCRYPT 94, 13th Annual Inter-national Conference on the Theory and Applications of Cryptographic Tech-niques, Perugia, Italy, May 9{12, 1994. Proceedings, volume 950 of LectureNotes in Computer Science, pages 92{111. Springer-Verlag, Berlin, 1994.
[23] J. Benaloh. Veri¯able Secret-Ballot Elections. PhD thesis, Yale University,Department of Computer Science, New Haven, Conn, USA, 1988.
[24] B. Berendt, O. GÄunther, and S. Spiekermann. Privacy in e-commerce: Statedpreferences vs. actual behavior. Communications of the ACM, 48(4):101{106,2005.
[25] M. Bond. Attacks on cryptoprocessor transaction sets. In C. K. Ko»c, D. Nac-cache, and C. Paar, editors, Third International Workshop on CryptographicHardware and Embedded Systems (CHES 2001), Paris, France, May 14{16,2001. Proceedings, volume 2162 of Lecture Notes in Computer Science, pages220{234. Springer-Verlag, Berlin, 2001.
[26] C. Boyd and A. Mathuria. Protocols for Authentication and Key Establish-ment. Springer-Verlag, 2003.
[27] E. Brickell, J. Camenisch, and L. Chen. Direct anonymous attestation. InProceedings of the 11th ACM Conference on Computer and CommunicationsSecurity, Washington DC, USA, October 25{29, 2004, pages 132{145. ACMPress, 2004.
[28] E. Brickell, L. Chen, and J. Li. A new direct anonymous attestation schemefrom bilinear maps. In P. Lipp, A. R. Sadeghi, and K. M. Koch, editors,Trust 2008, Villach, Austria, March 11{12, 2008. Proceedings, volume 4968of Lecture Notes in Computer Science. Springer-Verlag, Berlin, 2008.
[29] E. Brickell, L. Chen, and J. Li. Simpli¯ed security notions of direct anonymousattestation and a concrete scheme from pairings. Cryptology ePrint Archive,Report 2008/104, International Association for Cryptologic Research, 2008.http://eprint.iacr.org/2008/104.pdf.
[30] E. Brickell and J. Li. Enhanced privacy ID: A direct anonymous attestationscheme with enhanced revocation capabilities. In Proceedings of the 2007 ACMWorkshop on Privacy in Electronic Society (WPES '07), Alexandria, Virginia,USA, October 29, 2007, pages 21{30. ACM Press, 2007.
[31] J. Camenisch. E±cient anonymous ¯ngerprinting with group signatures. InT. Okamoto, editor, Advances in Cryptology | ASIACRYPT 2000, 6th In-ternational Conference on the Theory and Application of Cryptology and In-formation Security, Kyoto, Japan, December 3{7, 2000, Proceedings, volume1976 of Lecture Notes in Computer Science, pages 415{428. Springer-Verlag,2000.
[32] J. Camenisch and A. Lysyanskaya. A signature scheme with e±cient protocols.In S. Cimato, C. Galdi, and G. Persiano, editors, Third Conference on Securityin Communication Networks (SCN 2002), Amal¯, Italy, September 12{13,2002. Proceedings, volume 2576 of Lecture Notes in Computer Science, pages268{289. Springer-Verlag, Berlin, 2003.
[33] R. Campbell, J. Al-Muhtadi, P. Naldurg, and G. S. Mickunas. Towards secu-rity and privacy for pervasive computing. In M. Okada, B. Pierce, A. Scedrov,H. Tokuda, and A. Yonezawa, editors, International Symposium on SoftwareSecurity (ISSS 2002), Tokyo, Japan, November 8{10, 2002. Proceedings, vol-ume 2609 of Lecture Notes in Computer Science, pages 1{15. Springer-Verlag,Berlin, 2002.
[34] D. Chakraborty, A. Joshi, Y. Yesha, and T. Finin. Toward distributed servicediscovery in pervasive computing environments. IEEE Transactions on MobileComputing, 5(2):97{112, 2006.
[35] D. Challener, K. Yoder, R. Catherman, D. Sa®ord, and L. V. Doorn. APractical Guide to Trusted Computing. IBM Press, Pearson plc, Upper SaddleRiver, NJ, USA, 2008.
[36] H. Chen, J. Chen, W. Mao, and F. Yan. Daonity | Grid security from twolevels of virtualization. Information Security Technical Report, 12(3):123{138,2007.
[37] L. Chen, S. Pearson, and A. Vamvakas. On enhancing biometric authentica-tion with data protection. In R. J. Howlett and L. C. Jain, editors, FourthInternational Conference on Knowledge-Based Intelligent Information Engi-neering Systems & Allied Technologies (KES 2000), Brighton, UK, August30{September 1, 2000, Proceedings, volume 1 of 2, pages 249{252. IEEE, 2000.
[38] J.-G. Choi, K. Sakurai, and J.-H. Park. Does it need trusted third party?Design of buyer-seller watermarking protocolwithout trusted third party. InJ. Zhou, M. Yung, and Y. Han, editors, First International Conference onApplied Cryptography and Network Security (ACNS 2003), Kunming, China,October 16{19, 2003. Proceedings, volume 2846 of Lecture Notes in ComputerScience, pages 265{279. Springer-Verlag, Berlin, 2003.
[39] P. D. Chowdhury, B. Christianson, and J. Malcolm. Anonymous authenti-cation. In B. Christianson, B. Crispo, J. A. Malcolm, and M. Roe, editors,The 12th International Security Protocols Workshop, Cambridge, UK, April26{28, 2004. Proceedings, volume 3957 of Lecture Notes in Computer Science,pages 299{305. Springer-Verlag, Berlin, 2006.
[40] A. Cooper and A. Martin. Towards a secure, tamper-proof grid platform. InProceedings of the 6th IEEE International Symposium on Cluster Computingand the Grid (CCGrid 2006), Singapore, May 16{19, 2006, pages 373{380.IEEE Computer Society Press, 2006.
[41] I. J. Cox, J. Killian, T. Leighton, and T. Shamoon. Secure spread spec-trum watermarking for multimedia. IEEE Transactions on Image Processing,6(12):1673{1687, 1997.
[42] S. Crane. Privacy preserving trust agents. Technical Report HPL-2004-197,Hewlett-Packard Laboratories, Bristol, UK, November 2004.
[43] S. Creese, M. Goldsmith, B. Roscoe, and I. Zakiuddin. Authentication forpervasive computing. In D. Hutter, G. Muller, W. Stephan, and M. Ullmann,editors, First International Conference on Security in Pervasive Computing,Boppard, Germany, March 12{14, 2003. Proceedings, volume 2802, pages 116{129. Springer-Verlag, Berlin, 2004.
[44] J. Daemen and V. Rijmen. The Design of Rijndael: AES | The AdvancedEncryption Standard. Springer-Verlag, Berlin, 2002.
[45] A. W. Dent and C. J. Mitchell. User's Guide to Cryptography and Standards.Artech House, 2004.
[46] K. Dietrich, M. Pirker, T. Vejda, R. Toegl, T. Winkler, and P. Lipp. A prac-tical approach for establishing trust relationships between remote platformsusing trusted computing. In G. Barthe and C. Fournet, editors, Trustwor-thy Global Computing (TGC 2007), Sophia-Antipolis, France, November 5{6,2007. Proceedings, volume 4912 of Lecture Notes in Computer Science, pages156{168, 2007.
[47] W. Di±e and M. E. Hellman. New directions in cryptography. IEEE Trans-actions on Information Theory, 22(6):644{654, 1976.
[48] J. R. Douceur. The sybil attack. In P. Druschel, F. Kaashoek, and A. Row-stron, editors, The 1st International Workshop on Peer-to-Peer Systems(IPTPS 2002), Cambridge, MA, USA, March 7{8, 2002. Proceedings, volume2429 of Lecture Notes in Computer Science, pages 251{260. Springer-Verlag,Berlin, 2002.
[49] T. El Gamal. A public key cryptosystem and a signature scheme based ondiscrete logarithms. In G. R. Blakley and D. Chaum, editors, Advances inCryptology | CRYPTO'84, The 4th Annual International Cryptology Con-ference, Santa Barbara, California, USA, August 19{22, 1984, Proceedings,volume 196 of Lecture Notes in Computer Science, pages 10{18. Springer,New York, USA, 1985.
[50] C. Fontaine and F. Galand. A survey of homomorphic encryption for nonspe-cialists. EURASIP Journal on Information Security, 2007:1{10, 2007.
[51] A. Friday, N. Davies, N. Wallbank, E. Catterall, and S. Pink. Supportingservice discovery, querying and interaction in ubiquitous computing environ-ments. Wireless Networks, 10(6):631{641, 2004.
[52] S. Gajek, A.-R. Sadeghi, C. StÄuble, and M. Winandy. Compartmented se-curity for browsers - or how to thwart a phisher with trusted computing. InProceedings of the Second International Conference on Availability, Reliabil-ity and Security (ARES 2007), Vienna, Austria, April 10{13, 2007, pages120{127, 2007.
[53] A. S. Gajparia and C. J. Mitchell. Enhancing user privacy using trustedcomputing. In C. J. Mitchell, editor, Trusted Computing, chapter 8, pages239{250. IEE Press, London, 2005.
[54] E. Gallery. Authorisation Issues for Mobile Code in Mobile Systems. PhDthesis, RHUL-MA-2007-3, Department of Mathematics, Royal Holloway, Uni-versity of London, 2007.
[55] E. M. Gallery and C. J. Mitchell. Trusted computing: Security and applica-tions. Cryptologia, 2009. to appear.
[56] E. M. Gallery and A. Tomlinson. Secure delivery of conditional access ap-plications to mobile receivers. In C. J. Mitchell, editor, Trusted Computing,chapter 7, pages 195{237. IEE Press, London, 2005.
[57] S. L. Gar¯nkel, A. Juels, and R. Pappu. RFID privacy: An overview ofproblems and proposed solutions. IEEE Security and Privacy, 3(3):34{43,2005.
[58] H. Ge and S. R. Tate. A direct anonymous attestation scheme for embeddeddevices. In T. Okamoto and X. Wang, editors, 10th International Conferenceon Practice and Theory in Public-Key Cryptography (PKC 2007), Beijing,China, April 16{20, 2007. Proceedings, volume 4450 of Lecture Notes in Com-puter Science, pages 16{30. Springer Verlag, Berlin, 2007.
[59] C. Gehrmann, C. J. Mitchell, and K. Nyberg. Manual authentication forwireless devices. Cryptobytes, 7(1):29{37, 2004.
[60] B.-M. Goi, R. C.-W. Phan, Y. Yang, F. Bao, R. H. Deng, and M. U. Siddiqi.Cryptanalysis of two anonymous buyer-seller watermarking protocols and animprovement for true anonymity. In M. Jakobsson, M. Yung, and J. Zhou,editors, Second International Conference on Applied Cryptography and Net-work Security (ACNS 2004), Yellow Mountain, China, June 8{11, 2004, Pro-ceedings, volume 3089 of Lecture Notes in Computer Science, pages 369{382.Springer-Verlag, Berlin, 2004.
[61] O. Goldreich, S. Micali, and A. Wigderson. Proofs that yield nothing but theirvalidity or all languages in NP have zero-knowledge proof systems. Journal ofthe ACM, 38(3):690{728, 1991.
[62] S. Goldwasser and S. Micali. Probabilistic encryption. Journal of Computerand System Sciences, 28(2):270{299, 1984.
[63] S. Goldwasser and S. Micali. Probabilistic encryption. Journal of Computerand System Sciences, 28:279{299, 1984.
[64] S. Goldwasser, S. Micali, and C. Racko®. The knowledge complexity of inter-active proof systems. SIAM Journal on Computing, 18(1):186{208, 1989.
[65] D. Gollmann. What do we mean by entity authentication? In Proceedingsof the IEEE Symposium on Security and Privacy, Oakland, California, May6{8, 1996, pages 46{54. IEEE Computer Society, 1996.
[66] D. Grawrock. The Intel Safer Computing Initiative: Building Blocks forTrusted Computing. Intel Press, 2006.
[67] U. Grossmann, E. Berkhan, L. C. Jatoba, J. Ottenbacher, W. Stork, andK. D. Mueller-Glaser. Security for mobile low power nodes in a personal areanetwork by means of trusted platform modules. In F. Stajano, C. Meadows,S. Capkun, and T. Moore, editors, 4th European Workshop on Security andPrivacy in Ad-hoc and Sensor Networks (ESAS 2007), Cambridge, UK, July2{3, 2007. Proceedings, volume 4572 of Lecture Notes in Computer Science,pages 172{186. Springer-Verlag, Berlin, 2007.
[68] E. Guttman. Service Location Protocol: Automatic discovery of IP networkservices. IEEE Internet Computing, 4(3):71{80, 1999.
[69] E. Guttman, C. Perkins, J. Veizades, and M. Day. Service Location Protocol,Version 2. Request for Comments 2608, The Internet Engineering Task Force(IETF), June 1999.
[70] V. Haldar, D. Chandra, and M. Franz. Semantic remote attestation | Avirtual machine directed approach to Trusted Computing. In Proceedings ofthe 3rd USENIX Virtual Machine Research & Technology Symposium (VM'04), San Jose, CA, USA, May 6{7, 2004, pages 29{41. USENIX, May 2004.
[71] International Organization for Standardization, Geneva, Switzerland. ISO7498{2, Information processing systems | Open systems Interconnection |Basic reference model |Part 2: Security Architecture, 1989.
[72] International Organization for Standardization, Geneva, Switzerland.ISO/IEC 9797{1, Information technology | Security techniques | MessageAuthentication Codes (MACs) | Part 1: Mechanisms using block cipher,1999.
[73] International Organization for Standardization, Geneva, Switzerland.ISO/IEC 9797{2, Information technology | Security techniques | MessageAuthentication Codes (MACs) | Part 2: Mechanisms using a dedicated hash-function, 2002.
[74] International Organization for Standardization, Geneva, Switzerland.ISO/IEC 10118{3, Information technology | Security techniques | Hashfunctions | Part 3: Dedicated hash functions, 2004.
[75] International Organization for Standardization, Geneva, Switzerland.ISO/IEC 9798{6, Information technology | Security techniques | Entityauthentication | Part 6: Mechanisms using manual data transfer, 2005.
[76] International Organization for Standardization, Geneva, Switzerland.ISO/IEC 18033{2, Information technology | Security techniques | Encryp-tion algorithms | Part 2: Asymmetric ciphers, 2006.
[77] International Telecommunications Union (ITU-T). Recommendation X.509Information technology | Open Systems Interconnection | The Directory:Public-key and attribute certi¯cate frameworks, November 2008.
[78] M. Jarrett and P. Ward. Trusted computing for protecting ad hoc routing. InProceedings of the 4th Annual Communication Networks and Services ResearchConference (CNSR 2006), Moncton, New Brunswick, Canada, May 24{25,2006, pages 61{68. IEEE Computer Society, 2006.
[79] H. S. Ju, H. J. Kim, D. H. Lee, and J. I. Lim. An anonymous buyer-sellerwatermarking protocol with anonymity control. In P. J. Lee and C. H. Lim,editors, 5th International Conference on Information Security and Cryptology(ICISC 2002), Seoul, Korea, November 28{29, 2002. Proceedings, volume 2587of Lecture Notes in Computer Science, pages 421{432. Springer-Verlag, Berlin,2002.
[80] M. Kinateder and S. Pearson. A privacy-enhanced peer-to-peer reputationsystem. In K. Bauknecht, A. M. Tjoa, and G. Quirchmayr, editors, 4th Inter-national Conference on Electronic Commerce and Web Technologies (EC-Web2003), Prague, Czech Republic, September 2{5, 2003. Proceedings, volume2738 of Lecture Notes in Computer Science, pages 206{215. Springer-Verlag,Berlin, 2003.
[81] T. Kindberg and K. Zhang. Secure spontaneous device association. In A. Dey,A. Schmidt, and J. F. McCarthy, editors, 5th International Conference onUbiquitous Computing (Ubicomp'03), Seattle, Washington, USA, October 12{15, 2003. Proceedings, volume 2864 of Lecture Notes in Computer Science,pages 124{131. Springer-Verlag, Berlin, 2003.
[82] C. Krau¼, F. Stumpf, and C. Eckert. Detecting node compromise in hybridwireless sensor networks using attestation techniques. In F. Stajano, C. Meadows, S. Capkun, and T. Moore, editors, 4th European Workshop on Securityand Privacy in Ad-hoc and Sensor Networks (ESAS 2007), Cambridge, UK,July 2{3, 2007. Proceedings, volume 4572 of Lecture Notes in Computer Sci-ence, pages 203{217. Springer-Verlag, Berlin, 2007.
[83] S. Laur and K. Nyberg. E±cient mutual data authentication using manuallyauthenticated strings. In D. Pointcheval, Y. Mu, and K. Chen, editors, 5thInternational Conference on Cryptology and Network Security (CANS 2006),Suzhou, China, December, 8{10, 2006. Proceedings, volume 4301 of LectureNotes in Computer Science, pages 90{107. Springer-Verlag, Berlin, 2006.
[84] G. Lawton. Is it ¯nally time to worry about mobile malware. IEEE Computer,41(5):12{14, 2008.
[85] C.-L. Lei, P.-L. Yu, P.-L. Tsai, and M.-H. Chan. An e±cient and anonymousbuyer-seller watermarking protocol. IEEE Transactions on Image Processing,13(12):1618{1626, 2004.
[86] S. Li, S. Balfe, J. Zhou, and K. Chen. Enforcing trust in pervasive computingwith trusted computing technology. In J. Lopez, editor, First InternationalWorkshop on Critical Information Infrastructure Security (CRITIS 2006),Samos, Greece, August 31{September 1, 2006. Proceedings, volume 4347 ofLecture Notes in Computer Science, pages 195{209. Springer-Verlag, Berlin,2006.
[87] S. Li, S. Balfe, J. Zhou, and K. Chen. Enforcing trust in pervasive computing.International Journal of System of Systems Engineering, 1(1-2):96{110, 2008.
[88] H. LÄohr, H. V. Ramasamy, A.-R. Sadeghi, S. Schulz, M. Schunter, andC. StÄuble. Enhancing grid security using trusted virtualization. In B. Xiao,L. T. Yang, J. Ma, C. Muller-Schloer, and Y. Hua, editors, 4th InternationalConference on Autonomic and Trusted Computing (ATC 2007), Hong Kong,China, July 11{13, 2007. Proceedings, volume 4610 of Lecture Notes in Com-puter Science, pages 372{384. Springer-Verlag, Berlin, 2007.
[89] B. M. Macq and J. J. Quisquater. Cryptology for digital TV broadcasting.Proceedings of the IEEE, 83(6):944{957, 1995.
[90] W. Mao, F. Yan, and C. Chen. Daonity | Grid security with behaviour con-formity from trusted computing. In Proceedings of the First ACM Workshopon Scalable Trusted Computing (STC'06), Fairfax, Virginia, US, November 3,2006, pages 43{46. ACM Press, 2006.
[91] A. Martin and P.-W. Yau. Grid security: Next steps. Information SecurityTechnical Report, 12(3):113{122, 2007.
[92] K. Matsui and K. Tanaka. Video-steganography: How to secretly embed asignature in a picture. IMA Intellectual Property Project Proceedings, 1(1):187{205, 1994.
[93] R. Mayrhofer and H. Gellersen. Shake well before use: Authentication based onaccelerometer data. In A. LaMarca, M. Langheinrich, and K. N. Truong, edi-tors, 5th International Conference on Pervasive Computing (Pervasive 2007),Toronto, Ontario, Canada, May 13{16, 2007. Proceedings, volume 4480 ofLecture Notes in Computer Science, pages 144{161. Springer-Verlag, Berlin,2007.
[94] J. M. McCune, A. Perrig, and M. K. Reiter. Seeing-is-believing: Using cameraphones for human-veri¯able authentication. In Proceedings of the 2005 IEEESymposium of Security and Privacy (SP'05), Oakland, California, USA, May8{11, 2005, pages 110{124. IEEE Computer Society, 2005.
[95] J. M. McCune, A. Perrig, A. Seshadri, and L. van Doorn. Turtles all the waydown: Research challenges in user-based attestation. In Proceedings of the2nd USENIX Workshop on Hot Topics in Security (HotSec '07), Boston, MA,USA, August 7, 2007, 2007.
[96] D. H. McKnight and N. L. Chervany. The meanings of trust.Technical report, University of Minnesota, Minneaplois, MN, 1996.http://misrc.umn.edu/wpaper/WorkingPapers/9604.pdf.
[97] N. Memon and P. W. Wong. Protecting digital media content. Communica-tions of the ACM, 4(7):11{24, 1998.
[98] N. Memon and P. W. Wong. A buyer-seller watermarking protocol. IEEETransactions on Image Processing, 10(4):643{649, 2001.
[99] A. J. Menezes, P. C. van Oorschot, and S. A. Vanstone. Handbook of AppliedCryptography. CRC Press, Boca Raton, FL, USA, 1997.
[100] C. J. Mitchell, editor. Trusted Computing. IEE Press, London, 2005.
[101] W. Mohr. The wireless world research forum | WWRF. Computer Commu-nications, 26(1):2{10, Jan 2003.
[102] D. Molnar, A. Soppera, and D. Wagner. Privacy for RFID through trustedcomputing. In Proceedings of the 2005 ACM Workshop on Privacy in theElectronic Society (WPES '05), Alexandria, VA, USA, November 7, 2005,pages 31{34. ACM Press, 2005.
[103] G. E. Moore. Cramming more components onto integrated circuits. ElectronicsMagazine, 38(8):114{117, 1965.
[104] M. Myers, R. Ankney, A. Malpani, S. Galperin, and C. Adams. X.509 Internetpublic key infrastructure online certi¯cate status protocol (OCSP). Requestfor Comments 2560, Internet Engineering Task Force (IETF), June 1999.
[105] National Institute of Standards and Technology (NIST). Federal InformationProcessing Standards: Data Encryption Standard (DES). FIPS Publication46-3, National Institute of Standards and Technology, U.S. Department ofCommerce, Gaithersburg, MD, USA, October 1999.
[106] National Institute of Standards and Technology (NIST). Federal InformationProcessing Standards: Advance Encryption Standard (AES). FIPS Publica-tion 197, National Institute of Standards and Technology, U.S. Department ofCommerce, Gaithersburg, MD, USA, November 2001.
[107] National Institute of Standards and Technology (NIST). Federal InformationProcessing Standards: Secure Hash Standard. FIPS Publication 180-2, Na-tional Institute of Standards and Technology, U.S. Department of Commerce,Gaithersburg, MD, USA, 2002.
[108] M. Nidd. Service discovery in DEAPspace. IEEE Personal Communications,8(4):39{45, 2001.
[109] N. Niebert, A. Schieder, H. Abramowicz, G. Malmgren, J. S. C. Prehofer, andH. Karl. Ambient networks: An architecture for communication beyond 3G.IEEE Wireless Communications, 11(2):14{22, April 2004.
[110] I. G. Niemegeers and S. M. H. de Groot. Research issues in ad-hoc distributedpersonal networking. Wireless Personal Communications, 26(2{3):149{167,2003.
[111] P. Paillier. Public-key cryptosystems based on composite degree residuos-ity classes. In J. Stern, editor, Advances in Cryptology | EUROCRYPT1999, 18th Annual International Conference on the Theory and Applicationsof Cryptographic Techniques, Prague, Czech Republic, May 2{6, 1999. Pro-ceedings, volume 1592 of Lecture Notes in Computer Science, pages 223{238.Springer-Verlag, Berlin, 1999.
[112] A. Pashalidis and C. J. Mitchell. Single Sign-On using TCG-conformant plat-forms. In C. J. Mitchell, editor, Trusted Computing, chapter 6, pages 175{193.IEE Press, London, 2005.
[113] S. Pearson. Trusted agents that enhance user privacy by self-pro¯ling. Tech-nical Report HPL-2002-196, Hewlett-Packard Laboratories, Bristol, UK, July2002.
[114] S. Pearson. How trusted computers can enhance for privacy preserving mobileapplications. In Proceedings of the 2005 International Conference on a Worldof Wireless, Mobile and Multimedia Networks (WOWMOM 2005): First In-ternational IEEE WoWMoM Workshop on Trust, Security and Privacy forUbiquitous Computing, Taormina, Italy, June 13{16, 2005, pages 609{613.IEEE Computer Society, 2005.
[115] M. Peinado, P. England, and Y. Chen. An overview of NGSCB. In C. J.Mitchell, editor, Trusted Computing, chapter 4, pages 115{141. IEE Press,London, 2005.
[116] C. Perkins, E. Belding-Royer, and S. Das. Ad hoc on-demand distance vector(AODV) routing. Request for Comments 3561, Internet Engineering TaskForce (IETF), July 2003.
[117] A. P¯tzmann and M. Hansen. Anonymity, unlinkability, unobservabil-ity, pseudonymity, and identity management: A consolidated proposalfor terminology. Version v0.31, Privacy and Data Security, Faculty ofComputer Science, Institute of Systems Architecture, Technische Univer-sitÄat Dresden, Germany, Feburary 2008. Available at: http://dud.inf.tu-dresden.de/Anon Terminology.shtml.
[118] B. P¯tzmann and M. Schunter. Asymmetric ¯ngerprinting. In U. M. Maurer,editor, Advances in Cryptology | EUROCRYPT 1996, 15th Annual International Conference on the Theory and Applications of Cryptographic Tech-niques, Zaragoza, Spain, May 12{16, 1996. Proceedings, volume 1070 of Lec-ture Notes in Computer Science, pages 84{95. Springer-Verlag, Berlin, 1996.
[119] B. P¯tzmann and M. Waidner. Anonymous ¯ngerprinting. In W. Fumy,editor, Advances in Cryptology | EUROCRYPT 1997, 16th Annual Inter-national Conference on the Theory and Applications of Cryptographic Tech-niques, Konstanz, Germany, May 11{15, 1997. Proceedings, volume 1233 ofLecture Notes in Computer Science, pages 88{102. Springer-Verlag, Berlin,1997.
[120] F. Piper and S. Murphy. Cryptography: A Very Short Introduction. OxfordUniversity Press, 2002.
[121] Platform for Privacy Preferences (P3P) Working Group. Platform for PrivacyPreferences (P3P) Speci¯cations. Version 1.1, World Wide Web Consortium(W3C), MIT, Cambridge, MA, USA, ERCIM, Sophia-Antipolis, France, Keio,Kanagawa, Japan, November 13 2006. http://www.w3.org/TR/P3P11.
[122] B. Preneel, A. Bosselaers, and H. Dobbertin. The cryptographic hash functionRIPEMD-160. Cryptobytes, 3(2):9{14, 1997.
[123] A. Pridgen and C. Julien. A secure modular mobile agent system. In Pro-ceedings of the 2006 International Workshop on Software Engineering forLarge-Scale Multi-Agent Systems (SELMAS '06), Shanghai, China, May 22{23, 2006, pages 67{74. ACM Press, New York, NY, USA, 2006.
[124] G. J. Proudler. Concepts of trusted computing. In C. J. Mitchell, editor,Trusted Computing, chapter 2, pages 11{27. IEE Press, London, 2005.
[125] L. Qiao and K. Nahrstedt. Watermarking schemes and protocols for protectingrightful ownership and customer's rights. Journal of Visual Communicationand Image Representation, 9(3):194{210, 1998.
[126] K. Ren, W. Luo, K. Kim, and R. Deng. A novel privacy preserving authenti-cation and access control scheme for pervasive computing environments. IEEETransactions on Vehicular Technology, 55(4):1373{1384, 2006.
[127] R. Rivest, A. Shamir, and L. Adleman. A method for obtaining digital signa-tures and public key cryptosystems. Communications of the ACM, 21(2):120{126, 1978.
[128] R. L. Rivest. The md5 message digest algorithm. Request for Comments 1321,Internet Engineering Task Force (IETF), April 1992.
[129] R. L. Rivest. The RC4 encryption algorithm. Technical report, RSA DataSecurity Inc, Redwood City, CA, USA, 1992.
[130] J. Rosenburg, H. Schulzrinne, G. Camarillo, A. Johnston, J. Peterson,R. Sparks, M. Handley, and E. Schooler. SIP: Session initiation protocol.RFC 3261, Internet Engineering Task Force, Jun 2002.
[131] RSA Laboratories. PKCS #1: RSA Cryptography Standard. Version 2.1,RSA Security, Bedford, MA, USA, 2002.
[132] C. Rudolph. Covert identity information in direct anonymous attestation(DAA). In H. Venter, M. Elo®, L. Labuschagne, J. Elo®, and R. vonSolms, editors, 22nd IFIP TC-11 International Information Security Con-ference (SEC2007) on \New Approaches for Security, Privacy and Trust inComplex Environments", Sandton, South Africa, May 14{16, 2007. Proceed-ings, volume 232 of IFIP International Federation for Information Processing,pages 443{448. Springer, Boston, 2007.
[133] A.-R. Sadeghi and C. StÄuble. Property-based attestation for computing plat-forms: Caring about properties, not mechanisms. In Proceedings of the 2004Workshop on New Security Paradigms (NSPW '04), Nova Scotia, Canada,September 20{23, 2004, pages 67{77. ACM Press, 2004.
[134] Salutation Consortium. Salutation Architecture Speci¯cation, June 1999.http://www.salutation.org/.
[135] R. Sandhu and X. Zhang. Peer-to-peer access control architecture using trustedcomputing technology. In Proceedings of the Tenth ACM Symposium on AccessControl Models and Technologies (SACMAT '05), Stockholm, Sweden, June01{03, 2005, pages 147{158. ACM Press, New York, NY, USA, 2005.[136] R. R. Schell and M. F. Thompson. Platform security: What is lacking? In-formation Security Technical Report, 5(1):26{41, 2000.
[137] S. Schwiderski-Grosche, A. Tomlinson, and D. B. Pearce. Towards the secureinitialisation of a personal distributed environment. Technical Report RHUL{MA{2005{9, Mathematics Department, Royal Holloway, University of London,July 2005.
[138] P. E. Sevin»c, M. Strasser, and D. A. Basin. Securing the distribution and stor-age of secrets with trusted platform modules. In D. Sauveron, K. Markanton-akis, A. Bilas, and J.-J. Quisquater, editors, First International Workshop inInformation Security Theory and Practices: Smart Cards, Mobile and Ubiqui-tous Computing Systems (WISTP 2007), Heraklion, Crete, Greece, May 9{11,2007. Proceedings, volume 4462 of Lecture Notes in Computer Science, pages53{66. Springer-Verlag, Berlin, 2007.
[139] E. Shi, A. Perrig, and L. V. Doorn. BIND: A ¯ne-grained attestation servicefor secure distributed systems. In Proceedings of the 2005 IEEE Symposiumon Security and Privacy, Oakland, CA, USA, May 8{11, 2005, pages 154{168.IEEE Press, 2005.
[140] B. Smyth, M. Ryan, and L. Chen. Direct anonymous attestation (DAA):Ensuring privacy with corrupt administrators. In F. Stajano, C. Meadows,S. Capkun, and T. Moore, editors, 4th European Workshop on Security andPrivacy in Ad hoc and Sensor Networks (ESAS 2007) Cambridge, UK, July2{3, 2007. Proceedings, volume 4572 of Lecture Notes in Computer Science,pages 218{231. Springer-Verlag, Berlin, 2007.
[141] C. Soriente, G. Tsudik, and E. Uzun. BEDA: Button-enabled device as-sociation. In Proceedings of UbiComp 2007 Workshops: First InternationalWorkshop on Security for Spontaneous Interaction (IWSSI 2007), Innsbruck,Austria, September 16, 2007, pages 443{449, 2007.
[142] W. Stallings. Network Security Essentials: Applications and Standards. Pear-son Prentice Hall, Upper Saddle River, New Jersey, USA, third edition, 2007.
[143] F. Stumpf, C. Eckert, and S. Balfe. Towards secure e-commerce based onvirtualization and attestation techniques. In Proceedings of the The Third In-ternational Conference on Availability, Reliability and Security (ARES 2008),Barcelona, Spain, March 4{7, 2008, pages 376{382. IEEE Computer Society,2008.
[144] Sun Microsystems. Jini Architecture Speci¯cation. Version1.2, Sun Microsystems, Palo Alto, CA, USA, December 2001.http://www.sun.com/software/jini/specs/.
[145] F. Swiderski and W. Snyder. Threat Modeling. Microsoft Press, Redmond,Washington, 2004.
[146] Symantec Enterprise Security. Symantec Global Internet Security Threat Re-port: Trends for July{December 07. Volume XIII, Symantec Corporation,Cupertino, CA, USA, April 2008.
[147] I. Teranishi, J. Furukawa, and K. Sako. k-times anonymous authentication. InP. J. Lee, editor, Advances in Cryptology | ASIACRYPT 2004, 10th Interna-tional Conference on the Theory and Application of Cryptology and Informa-tion Security, Jeju Island, Korea, December 5{9, 2004. Proceedings, volume3329 of Lecture Notes in Computer Science, pages 308{322. Springer-Verlag,Berlin, 2004.
[148] M. S. Thompson and S. F. Midki®. Service description for pervasive ser-vice discovery. In Proceedings of the 25th IEEE International Conference onDistributed Computing Systems Workshops: First International Workshop onServices and Infrastructure for the Ubiquitous and Mobile Internet (SIUMI)(ICDCSW'05), Columbus, Ohio, USA, June 6{10, 2005, pages 273{279. IEEEComputer Society, 2005.
[149] P. Tomsich and S. Katzenbeisser. Towards a robust and de-centralized dig-ital watermarking infrastructure for the protection of intellectual property.In K. Bauknecht, S. K. Madria, and G. Pernul, editors, First InternationalConference on Electronic Commerce and Web Technologies (EC-Web 2000),London, UK, September 4{6, 2000. Proceedings, volume 1875 of Lecture Notesin Computer Science, pages 38{47. Springer-Verlag, Berlin, 2000.
[150] Trusted Computing Group (TCG). TPM v1.2 Speci¯cation Changes. A sum-mary of changes, Trusted Computing Group, Portland, Oregon, USA, October2003.
[151] Trusted Computing Group (TCG). TCG Speci¯cation Architecture Overview.Version 1.2, The Trusted Computing Group, Portland, Oregon, USA, April2004.
[152] Trusted Computing Platform Alliance (TCPA). TCPA Main Speci¯cation.Version 1.1b, Trusted Computing Group, Portland, Oregon, USA, February2002.
[153] Universal Plug and Play (UPnP) Forum. UPnP Device Architecture. version1.0, December 2003. http://www.upnp.org/.
[154] R. G. van Schyndel, A. Z. Tirkel, and C. F. Osbourne. A digital watermark. InProceedings of the IEEE Conference on Image Processing (ICIP'94), Austin,Texas, USA, November 13{16, 1994, pages 86{90. IEEE Press, 1994.
[155] G. Voyatzis and I. Pitas. The use of watermarks in the protection of digitalmultimedia products. IEEE Proceedings, 87:1197{1207, 1999.
[156] M. Walker and T. Wright. Security. In F. Hillebrand, editor, GSM and UMTS:The Creation of Global Mobile Communication, chapter 15, pages 385{406.John Wiley & Sons, New York, 2002.
[157] M. Weiser. The computer for the twenty-¯rst century. Scienti¯c American,265(3):94{104, 1991.
[158] M. Wu and A. Friday. Integrating privacy enhancing services in ubiquitouscomputing environments. In Proceedings of the 4th International UbiCompWorkshop (UBICOMP 2002): Security in Ubiquitous Computing, Goteborg,Sweden, September 29 { October 1, 2002, pages 1{5, 2002.
[159] E. D. Yan. Zero con¯guration networking. The Internet Protocol Journal,5(4):20{26, 2002.
[160] Z. Yan and P. Cofta. A mechanism for trust sustainability among trustedcomputing platforms. In S. Katsikas, J. Lopez, and G. Pernul, editors, FirstInternational Conference on Trust and Privacy in digital Business (TrustBus2004), Zaragoza, Spain, August 30 { September 1, 2004. Proceedings, volume3184 of Lecture Notes in Computer Science, pages 11{19. Springer-Verlag,Berlin, 2004.
[161] P.-W. Yau and A. Tomlinson. Using trusted computing in commercial grids.In U. Priss, S. Polovina, and R. Hill, editors, 15th International Conference on Conceptual Structures (ICCS 2007), She±eld, UK, July 22{27, 2007, Pro-ceedings, volume 4604 of Lecture Notes in Computer Science, pages 31{36.Springer-Verlag, Berlin, 2007.
[162] P.-W. Yau, A. Tomlinson, S. Balfe, and E. M. Gallery. Securing grid work°owswith trusted computing. In M. Bubak, G. dick van Albada, P. M. A. Sloot,and J. J. Dongarra, editors, 8th International Conference on Computer Science(ICCS '08), Krak¶ow, Poland, June 23{25, 2008, Proceedings, Part III, volume5103 of Lecture Notes in Computer Science, pages 510{519. Springer-Verlag,Berlin, 2008.
[163] J. Zhang, W. Kou, and K. Fan. Secure Buyer-Seller Watermarking Protocol.IEE Proceedings on Information Security, 153(1):15{18, 2006.
[164] F. Zhu, M. Mutka, and L. Li. Service discovery in pervasive computing envi-ronments. IEEE Pervasive Computing, 4(4):81{90, 2005.
[165] F. Zhu, M. Mutka, and L. Ni. Prudent Exposure: A private and user-centricservice discovery protocol. In Proceedings of the Second IEEE Conference onPervasive Computing and Communications (PerCom'04), Orlando, Florida,March 14{17, 2004, pages 329{328. IEEE Computer Society, 2004.
[166] F. Zhu, M. Mutka, and L. Ni. A private, secure and user-centric informationexposure model for service discovery protocols. IEEE Transactions on MobileComputing, 5(4):418{429, 2006.
[167] F. Zhu, W. Zhu, M. W. Mutka, and L. Ni. Expose or not? A progressive expo-sure approach for service discovery in pervasive computing environments. InProceedings of the Third IEEE International Conference on Pervasive Com-puting and Communications (PerCom 2005), Kauai Island, Hawaii, March8{12, 2005, pages 225{234. IEEE Computer Society, 2005.