Securing Mobile Services using Trusted Computing

Adrian Ho Yin Leung

(2009)

Adrian Ho Yin Leung (2009) Securing Mobile Services using Trusted Computing.

Our Full Text Deposits

Full text access: Open

Full Text - 2.4 MB

Links to Copies of this Item Held Elsewhere


Abstract

This thesis examines how trusted computing technology can be used to enhance the security of ubiquitous services in mobile environments. It is envisaged that, in a mobile ubiquitous environment, users (through one of their mobile devices and using a range of network access technologies) will be able to seamlessly discover, select, and access a rich offering of services and content from a range of service providers. To realise this vision, it is important that security and privacy issues are addressed from the outset. Initially we introduce the model of mobile ubiquitous computing that underlies the discussions in the remainder of the thesis. We then identify the security requirements for ubiquitous service provision arising in the context of this model. In Part II of the thesis we examine the technology of trusted computing. We consider the effectiveness of a recently proposed attack on one of the trusted computing primitives, namely the Direct Anonymous Attestation protocol, and also examine ways in which the attack can be prevented. We further cryptanalyse a trusted computing based protocol designed to secure the storage and distribution of secrets. In the final part of the thesis, we propose three novel schemes for mobile services security, all using trusted computing as the primary building block. Firstly, we describe a Secure and Private Service Discovery Protocol in which, during the service discovery process, the trustworthiness of a user platform is anonymously authenticated to a service provider, whilst a service provider is simultaneously authenticated to the user. The novel scheme possesses the following desirable properties: user anonymity, service information confidentiality, unlinkability, and rogue blacklisting. We next present a Device Management Framework for Secure Service Delivery. Apart from providing secure service interactions between the service provider and user devices, the framework is designed to reduce the complexity of device security management tasks for users. The framework also protects the interests of service providers by preventing unauthorised credential sharing amongst user devices. One other novel feature of the framework is that compromised devices are self-revoking, hence removing the need for a cumbersome revocation infrastructure. Finally, we construct a Privacy-Preserving Content Watermarking Scheme. Our scheme minimises the reliance on a TTP for privacy protection, as the buyer can generate verifiable pseudonyms on its own. As a result, we are able to reduce communication overheads, and hence improve the overall efficiency compared to existing schemes. In addition, the content provider is able to obtain assurance that a buyer-generated watermark is well-formed. The scheme also provides the following security features: framing resistance, user anonymity, content information confidentiality, unlinkability (even against the TTP), and transaction linkability.

Information about this Version

This is a Published version
This version's date is: 10/07/2009
This item is peer reviewed

Link to this Version

https://repository.royalholloway.ac.uk/items/ac233030-de8d-1d7a-21a1-e3e893fe524d/1/

Item TypeMonograph (Technical Report)
TitleSecuring Mobile Services using Trusted Computing
AuthorsHo Yin Leung, Adrian
DepartmentsFaculty of Science\Mathematics

Deposited by () on 24-Jun-2010 in Royal Holloway Research Online.Last modified on 15-Dec-2010

Notes

References

[1] 3rd Generation Partnership Project, Technical Specication Group Services and
System Aspects, 3G Security, Valbonne, France. 3GPP TS 33.102 V7.1.0 |
Security Architecture (Release 7), December 2006.

[2] 3rd Generation Partnership Project, Technical Speci¯cation Group Services
and System Aspects, 3G Security, Valbonne, France. 3GPP TS 35.202 V7.0.0
| Spec¯cation of the 3GPP Con¯dentiality and Integrity Algorithms, Docu-
ment 2: KASUMI Speci¯cation (Release 7), June 2007.

[3] M. Abadi and C. Fournet. Private authentication. Theoretical Computer
Science, 322(3):427{476, 2004.

[4] M. Abadi and A. D. Gordon. A calculus for cryptographic protocols: the
spi calculus. In Proceedings of the 4th ACM Conference on Computer and
Communications Security (CCS '97), Zurich, Switzerland, April 1{4, 1997,
pages 36{47, New York, NY, USA, 1997. ACM Press.

[5] I. Abbadi. Authorised domain management using location based services. In
Proceedings of the 4th International Conference on Mobile Technology, Ap-
plications & Systems (Mobility'07), Singapore, September 10{12, 2007, pages
288{295. ACM Press, 2007.

[6] I. Abbadi. Digital rights management using a master control device. In
I. Cervesato, editor, 12th Annual Asian Computing Science Conference Focus-
ing on Computer and Network Security (ASIAN'07), Doha, Qatar, December
9{11, 2007. Proceedings, volume 4846 of Lecture Notes in Computer Science,
pages 126{141. Springer-Verlag, Berlin, 2007.

[7] I. Abbadi and C. J. Mitchell. Digital rights management using a mobile phone.
In Proceedings of the Ninth International Conference on Electronic Commerce
(ICEC 2007), Minneapolis, MN, USA, August 19{22, 2007, pages 185{194.
ACM Press, 2007.

[8] C. Adams and S. Lloyd. Understanding PKI: Concepts, Standards, and De-
ployment Considerations. Addison Wesley, second edition, 2002.

[9] A. Alsaid and C. J. Mitchell. Preventing phishing attacks using trusted com-
puting technology. In Proceedings of the Sixth International Network Confer-
ence (INC 2006), Plymouth, UK, July 11{14, 2006, pages 221{228, 2006.

[10] R. C. Atkinson, J. Irvine, J. Dunlop, and S. Vadagama. The personal dis-
tributed environment. IEEE Wireless Communications, 14(2):62{69, April
2007.

[11] B. Balache®, L. Chen, S. Pearson, D. Plaquin, and G. Proudler. Trusted
Computing Platforms: TCPA Technology in Context. Prentice Hall PTR,
Upper Saddle River, New Jersey, 2003.

[12] D. Balfanz, D. K. Smetters, P. Stewart, and H. C. Wong. Talking to strangers:
Authentication in ad hoc wireless networks. In Proceedings of Network and
Distributed Systems Security Symposium 2002 (NDSS'02), San Diego, Cali-
fornia, Feburary 6{8, 2002. The Internet Society, Reston, Virgina, 2002.
[13] S. Balfe and E. Gallery. Mobile agents and the deus ex machina. In Proceedings
of the 21st International Conference on Advanced Information Networking and
Applications (AINA 2007): 2007 IEEE Symposium on Ubisafe Computing
(UBISAFE 2007), Niagara Falls, Canada, May 21-23, 2007, volume 2, pages
486{492. IEEE Computer Society, 2007.

[14] S. Balfe, E. Gallery, C. J. Mitchell, and K. G. Paterson. Crimeware and trusted
computing. In M. Jakobsson and Z. Ramzan, editors, Crimeware: Understand-
ing New Attacks and Defenses, chapter 15, pages 457{472. Addison-Wesley,
2008.

[15] S. Balfe, E. Gallery, K. G. Paterson, and C. J. Mitchell. Challenges for trusted
computing. Technical Report RHUL-MA-2008-14, Department of Mathemat-
ics, Royal Holloway, University of London, Feburary 2008.

[16] S. Balfe, A. D. Lakhani, and K. G. Paterson. Securing peer-to-peer networks
using trusted computing. In C. J. Mitchell, editor, Trusted Computing, chap-
ter 10, pages 271{298. IEE Press, London, 2005.

[17] S. Balfe, A. D. Lakhani, and K. G. Paterson. Trusted computing: Providing
security for peer-to-peer networks. In Proceedings of the Fifth International
Conference on Peer-to-Peer Computing (P2P'05), Konstanz, Germany, Au-
gust 31{September 2, 2005, pages 117{124. IEEE Computer Society, Aug-Sep
2005.

[18] S. Balfe and A. Mohammed. Final fantasy: Securing on-line gaming with
trusted computing. In B. Xiao, L. T. Yang, J. Ma, C. Muller-Schloer, and
Y. Hua, editors, 4th International Conference on Autonomic and Trusted Com-
puting (ATC 2007), Hong Kong, China, July 11{13, 2007. Proceedings, volume
4610 of Lecture Notes in Computer Science, pages 123{134. Springer-Verlag,
Berlin, 2007.

[19] S. Balfe and K. G. Paterson. Augmenting internet-based card not present
transactions with trusted computing. Technical Report RHUL-MA-2006-9v2,

Department of Mathematics, Royal Holloway, University of London, 2006.
[20] S. Balfe and K. G. Paterson. e-EMV: Emulating EMV for internet payments
using trusted computing technology. Technical Report RHUL-MA-2006-10 v2,
Department of Mathematics, Royal Holloway, University of London, 2006.

[21] F. Bao and R. H. Deng. Privacy protection for transactions of digital goods.
In S. Qing, T. Okamoto, and J. Zhou, editors, Third International Conference
on Information and Communications Security (ICICS2001), Xian, China,
November 13{16, 2001. Proceedings, volume 2229 of Lecture Notes in Com-
puter Science, pages 202{213. Springer-Verlag, Berlin, 2001.

[22] M. Bellare and P. Rogaway. Optimal asymmetric encryption. In R. Ruep-
pel, editor, Advances in Cryptology | EUROCRYPT 94, 13th Annual Inter-
national Conference on the Theory and Applications of Cryptographic Tech-
niques, Perugia, Italy, May 9{12, 1994. Proceedings, volume 950 of Lecture
Notes in Computer Science, pages 92{111. Springer-Verlag, Berlin, 1994.

[23] J. Benaloh. Veri¯able Secret-Ballot Elections. PhD thesis, Yale University,
Department of Computer Science, New Haven, Conn, USA, 1988.

[24] B. Berendt, O. GÄunther, and S. Spiekermann. Privacy in e-commerce: Stated
preferences vs. actual behavior. Communications of the ACM, 48(4):101{106,
2005.

[25] M. Bond. Attacks on cryptoprocessor transaction sets. In C. K. Ko»c, D. Nac-
cache, and C. Paar, editors, Third International Workshop on Cryptographic
Hardware and Embedded Systems (CHES 2001), Paris, France, May 14{16,
2001. Proceedings, volume 2162 of Lecture Notes in Computer Science, pages
220{234. Springer-Verlag, Berlin, 2001.

[26] C. Boyd and A. Mathuria. Protocols for Authentication and Key Establish-
ment. Springer-Verlag, 2003.

[27] E. Brickell, J. Camenisch, and L. Chen. Direct anonymous attestation. In
Proceedings of the 11th ACM Conference on Computer and Communications
Security, Washington DC, USA, October 25{29, 2004, pages 132{145. ACM
Press, 2004.

[28] E. Brickell, L. Chen, and J. Li. A new direct anonymous attestation scheme
from bilinear maps. In P. Lipp, A. R. Sadeghi, and K. M. Koch, editors,
Trust 2008, Villach, Austria, March 11{12, 2008. Proceedings, volume 4968
of Lecture Notes in Computer Science. Springer-Verlag, Berlin, 2008.

[29] E. Brickell, L. Chen, and J. Li. Simpli¯ed security notions of direct anonymous
attestation and a concrete scheme from pairings. Cryptology ePrint Archive,
Report 2008/104, International Association for Cryptologic Research, 2008.
http://eprint.iacr.org/2008/104.pdf.

[30] E. Brickell and J. Li. Enhanced privacy ID: A direct anonymous attestation
scheme with enhanced revocation capabilities. In Proceedings of the 2007 ACM
Workshop on Privacy in Electronic Society (WPES '07), Alexandria, Virginia,
USA, October 29, 2007, pages 21{30. ACM Press, 2007.

[31] J. Camenisch. E±cient anonymous ¯ngerprinting with group signatures. In
T. Okamoto, editor, Advances in Cryptology | ASIACRYPT 2000, 6th In-
ternational Conference on the Theory and Application of Cryptology and In-
formation Security, Kyoto, Japan, December 3{7, 2000, Proceedings, volume
1976 of Lecture Notes in Computer Science, pages 415{428. Springer-Verlag,
2000.

[32] J. Camenisch and A. Lysyanskaya. A signature scheme with e±cient protocols.
In S. Cimato, C. Galdi, and G. Persiano, editors, Third Conference on Security
in Communication Networks (SCN 2002), Amal¯, Italy, September 12{13,
2002. Proceedings, volume 2576 of Lecture Notes in Computer Science, pages
268{289. Springer-Verlag, Berlin, 2003.

[33] R. Campbell, J. Al-Muhtadi, P. Naldurg, and G. S. Mickunas. Towards secu-
rity and privacy for pervasive computing. In M. Okada, B. Pierce, A. Scedrov,
H. Tokuda, and A. Yonezawa, editors, International Symposium on Software
Security (ISSS 2002), Tokyo, Japan, November 8{10, 2002. Proceedings, vol-
ume 2609 of Lecture Notes in Computer Science, pages 1{15. Springer-Verlag,
Berlin, 2002.

[34] D. Chakraborty, A. Joshi, Y. Yesha, and T. Finin. Toward distributed service
discovery in pervasive computing environments. IEEE Transactions on Mobile
Computing, 5(2):97{112, 2006.

[35] D. Challener, K. Yoder, R. Catherman, D. Sa®ord, and L. V. Doorn. A
Practical Guide to Trusted Computing. IBM Press, Pearson plc, Upper Saddle
River, NJ, USA, 2008.

[36] H. Chen, J. Chen, W. Mao, and F. Yan. Daonity | Grid security from two
levels of virtualization. Information Security Technical Report, 12(3):123{138,
2007.

[37] L. Chen, S. Pearson, and A. Vamvakas. On enhancing biometric authentica-
tion with data protection. In R. J. Howlett and L. C. Jain, editors, Fourth
International Conference on Knowledge-Based Intelligent Information Engi-
neering Systems & Allied Technologies (KES 2000), Brighton, UK, August
30{September 1, 2000, Proceedings, volume 1 of 2, pages 249{252. IEEE, 2000.

[38] J.-G. Choi, K. Sakurai, and J.-H. Park. Does it need trusted third party?
Design of buyer-seller watermarking protocolwithout trusted third party. In
J. Zhou, M. Yung, and Y. Han, editors, First International Conference on
Applied Cryptography and Network Security (ACNS 2003), Kunming, China,
October 16{19, 2003. Proceedings, volume 2846 of Lecture Notes in Computer
Science, pages 265{279. Springer-Verlag, Berlin, 2003.

[39] P. D. Chowdhury, B. Christianson, and J. Malcolm. Anonymous authenti-
cation. In B. Christianson, B. Crispo, J. A. Malcolm, and M. Roe, editors,
The 12th International Security Protocols Workshop, Cambridge, UK, April
26{28, 2004. Proceedings, volume 3957 of Lecture Notes in Computer Science,
pages 299{305. Springer-Verlag, Berlin, 2006.

[40] A. Cooper and A. Martin. Towards a secure, tamper-proof grid platform. In
Proceedings of the 6th IEEE International Symposium on Cluster Computing
and the Grid (CCGrid 2006), Singapore, May 16{19, 2006, pages 373{380.
IEEE Computer Society Press, 2006.

[41] I. J. Cox, J. Killian, T. Leighton, and T. Shamoon. Secure spread spec-
trum watermarking for multimedia. IEEE Transactions on Image Processing,
6(12):1673{1687, 1997.

[42] S. Crane. Privacy preserving trust agents. Technical Report HPL-2004-197,
Hewlett-Packard Laboratories, Bristol, UK, November 2004.

[43] S. Creese, M. Goldsmith, B. Roscoe, and I. Zakiuddin. Authentication for
pervasive computing. In D. Hutter, G. Muller, W. Stephan, and M. Ullmann,
editors, First International Conference on Security in Pervasive Computing,
Boppard, Germany, March 12{14, 2003. Proceedings, volume 2802, pages 116{
129. Springer-Verlag, Berlin, 2004.

[44] J. Daemen and V. Rijmen. The Design of Rijndael: AES | The Advanced
Encryption Standard. Springer-Verlag, Berlin, 2002.

[45] A. W. Dent and C. J. Mitchell. User's Guide to Cryptography and Standards.
Artech House, 2004.

[46] K. Dietrich, M. Pirker, T. Vejda, R. Toegl, T. Winkler, and P. Lipp. A prac-
tical approach for establishing trust relationships between remote platforms
using trusted computing. In G. Barthe and C. Fournet, editors, Trustwor-
thy Global Computing (TGC 2007), Sophia-Antipolis, France, November 5{6,
2007. Proceedings, volume 4912 of Lecture Notes in Computer Science, pages
156{168, 2007.

[47] W. Di±e and M. E. Hellman. New directions in cryptography. IEEE Trans-
actions on Information Theory, 22(6):644{654, 1976.

[48] J. R. Douceur. The sybil attack. In P. Druschel, F. Kaashoek, and A. Row-
stron, editors, The 1st International Workshop on Peer-to-Peer Systems
(IPTPS 2002), Cambridge, MA, USA, March 7{8, 2002. Proceedings, volume
2429 of Lecture Notes in Computer Science, pages 251{260. Springer-Verlag,
Berlin, 2002.

[49] T. El Gamal. A public key cryptosystem and a signature scheme based on
discrete logarithms. In G. R. Blakley and D. Chaum, editors, Advances in
Cryptology | CRYPTO'84, The 4th Annual International Cryptology Con-
ference, Santa Barbara, California, USA, August 19{22, 1984, Proceedings,
volume 196 of Lecture Notes in Computer Science, pages 10{18. Springer,
New York, USA, 1985.

[50] C. Fontaine and F. Galand. A survey of homomorphic encryption for nonspe-
cialists. EURASIP Journal on Information Security, 2007:1{10, 2007.

[51] A. Friday, N. Davies, N. Wallbank, E. Catterall, and S. Pink. Supporting
service discovery, querying and interaction in ubiquitous computing environ-
ments. Wireless Networks, 10(6):631{641, 2004.

[52] S. Gajek, A.-R. Sadeghi, C. StÄuble, and M. Winandy. Compartmented se-
curity for browsers - or how to thwart a phisher with trusted computing. In
Proceedings of the Second International Conference on Availability, Reliabil-
ity and Security (ARES 2007), Vienna, Austria, April 10{13, 2007, pages
120{127, 2007.

[53] A. S. Gajparia and C. J. Mitchell. Enhancing user privacy using trusted
computing. In C. J. Mitchell, editor, Trusted Computing, chapter 8, pages
239{250. IEE Press, London, 2005.

[54] E. Gallery. Authorisation Issues for Mobile Code in Mobile Systems. PhD
thesis, RHUL-MA-2007-3, Department of Mathematics, Royal Holloway, Uni-
versity of London, 2007.

[55] E. M. Gallery and C. J. Mitchell. Trusted computing: Security and applica-
tions. Cryptologia, 2009. to appear.

[56] E. M. Gallery and A. Tomlinson. Secure delivery of conditional access ap-
plications to mobile receivers. In C. J. Mitchell, editor, Trusted Computing,
chapter 7, pages 195{237. IEE Press, London, 2005.

[57] S. L. Gar¯nkel, A. Juels, and R. Pappu. RFID privacy: An overview of
problems and proposed solutions. IEEE Security and Privacy, 3(3):34{43,
2005.

[58] H. Ge and S. R. Tate. A direct anonymous attestation scheme for embedded
devices. In T. Okamoto and X. Wang, editors, 10th International Conference
on Practice and Theory in Public-Key Cryptography (PKC 2007), Beijing,
China, April 16{20, 2007. Proceedings, volume 4450 of Lecture Notes in Com-
puter Science, pages 16{30. Springer Verlag, Berlin, 2007.

[59] C. Gehrmann, C. J. Mitchell, and K. Nyberg. Manual authentication for
wireless devices. Cryptobytes, 7(1):29{37, 2004.

[60] B.-M. Goi, R. C.-W. Phan, Y. Yang, F. Bao, R. H. Deng, and M. U. Siddiqi.
Cryptanalysis of two anonymous buyer-seller watermarking protocols and an
improvement for true anonymity. In M. Jakobsson, M. Yung, and J. Zhou,
editors, Second International Conference on Applied Cryptography and Net-
work Security (ACNS 2004), Yellow Mountain, China, June 8{11, 2004, Pro-
ceedings, volume 3089 of Lecture Notes in Computer Science, pages 369{382.
Springer-Verlag, Berlin, 2004.

[61] O. Goldreich, S. Micali, and A. Wigderson. Proofs that yield nothing but their
validity or all languages in NP have zero-knowledge proof systems. Journal of
the ACM, 38(3):690{728, 1991.

[62] S. Goldwasser and S. Micali. Probabilistic encryption. Journal of Computer
and System Sciences, 28(2):270{299, 1984.

[63] S. Goldwasser and S. Micali. Probabilistic encryption. Journal of Computer
and System Sciences, 28:279{299, 1984.

[64] S. Goldwasser, S. Micali, and C. Racko®. The knowledge complexity of inter-
active proof systems. SIAM Journal on Computing, 18(1):186{208, 1989.

[65] D. Gollmann. What do we mean by entity authentication? In Proceedings
of the IEEE Symposium on Security and Privacy, Oakland, California, May
6{8, 1996, pages 46{54. IEEE Computer Society, 1996.

[66] D. Grawrock. The Intel Safer Computing Initiative: Building Blocks for
Trusted Computing. Intel Press, 2006.

[67] U. Grossmann, E. Berkhan, L. C. Jatoba, J. Ottenbacher, W. Stork, and
K. D. Mueller-Glaser. Security for mobile low power nodes in a personal area
network by means of trusted platform modules. In F. Stajano, C. Meadows,
S. Capkun, and T. Moore, editors, 4th European Workshop on Security and
Privacy in Ad-hoc and Sensor Networks (ESAS 2007), Cambridge, UK, July
2{3, 2007. Proceedings, volume 4572 of Lecture Notes in Computer Science,
pages 172{186. Springer-Verlag, Berlin, 2007.

[68] E. Guttman. Service Location Protocol: Automatic discovery of IP network
services. IEEE Internet Computing, 4(3):71{80, 1999.

[69] E. Guttman, C. Perkins, J. Veizades, and M. Day. Service Location Protocol,
Version 2. Request for Comments 2608, The Internet Engineering Task Force
(IETF), June 1999.

[70] V. Haldar, D. Chandra, and M. Franz. Semantic remote attestation | A
virtual machine directed approach to Trusted Computing. In Proceedings of
the 3rd USENIX Virtual Machine Research & Technology Symposium (VM
'04), San Jose, CA, USA, May 6{7, 2004, pages 29{41. USENIX, May 2004.

[71] International Organization for Standardization, Geneva, Switzerland. ISO
7498{2, Information processing systems | Open systems Interconnection |
Basic reference model |Part 2: Security Architecture, 1989.

[72] International Organization for Standardization, Geneva, Switzerland.
ISO/IEC 9797{1, Information technology | Security techniques | Message
Authentication Codes (MACs) | Part 1: Mechanisms using block cipher,
1999.

[73] International Organization for Standardization, Geneva, Switzerland.
ISO/IEC 9797{2, Information technology | Security techniques | Message
Authentication Codes (MACs) | Part 2: Mechanisms using a dedicated hash-
function, 2002.

[74] International Organization for Standardization, Geneva, Switzerland.
ISO/IEC 10118{3, Information technology | Security techniques | Hash
functions | Part 3: Dedicated hash functions, 2004.

[75] International Organization for Standardization, Geneva, Switzerland.
ISO/IEC 9798{6, Information technology | Security techniques | Entity
authentication | Part 6: Mechanisms using manual data transfer, 2005.

[76] International Organization for Standardization, Geneva, Switzerland.
ISO/IEC 18033{2, Information technology | Security techniques | Encryp-
tion algorithms | Part 2: Asymmetric ciphers, 2006.

[77] International Telecommunications Union (ITU-T). Recommendation X.509
Information technology | Open Systems Interconnection | The Directory:
Public-key and attribute certi¯cate frameworks, November 2008.

[78] M. Jarrett and P. Ward. Trusted computing for protecting ad hoc routing. In
Proceedings of the 4th Annual Communication Networks and Services Research
Conference (CNSR 2006), Moncton, New Brunswick, Canada, May 24{25,
2006, pages 61{68. IEEE Computer Society, 2006.

[79] H. S. Ju, H. J. Kim, D. H. Lee, and J. I. Lim. An anonymous buyer-seller
watermarking protocol with anonymity control. In P. J. Lee and C. H. Lim,
editors, 5th International Conference on Information Security and Cryptology
(ICISC 2002), Seoul, Korea, November 28{29, 2002. Proceedings, volume 2587
of Lecture Notes in Computer Science, pages 421{432. Springer-Verlag, Berlin,
2002.

[80] M. Kinateder and S. Pearson. A privacy-enhanced peer-to-peer reputation
system. In K. Bauknecht, A. M. Tjoa, and G. Quirchmayr, editors, 4th Inter-
national Conference on Electronic Commerce and Web Technologies (EC-Web
2003), Prague, Czech Republic, September 2{5, 2003. Proceedings, volume
2738 of Lecture Notes in Computer Science, pages 206{215. Springer-Verlag,
Berlin, 2003.

[81] T. Kindberg and K. Zhang. Secure spontaneous device association. In A. Dey,
A. Schmidt, and J. F. McCarthy, editors, 5th International Conference on
Ubiquitous Computing (Ubicomp'03), Seattle, Washington, USA, October 12{
15, 2003. Proceedings, volume 2864 of Lecture Notes in Computer Science,
pages 124{131. Springer-Verlag, Berlin, 2003.

[82] C. Krau¼, F. Stumpf, and C. Eckert. Detecting node compromise in hybrid
wireless sensor networks using attestation techniques. In F. Stajano, C. Meadows, S. Capkun, and T. Moore, editors, 4th European Workshop on Security
and Privacy in Ad-hoc and Sensor Networks (ESAS 2007), Cambridge, UK,
July 2{3, 2007. Proceedings, volume 4572 of Lecture Notes in Computer Sci-
ence, pages 203{217. Springer-Verlag, Berlin, 2007.

[83] S. Laur and K. Nyberg. E±cient mutual data authentication using manually
authenticated strings. In D. Pointcheval, Y. Mu, and K. Chen, editors, 5th
International Conference on Cryptology and Network Security (CANS 2006),
Suzhou, China, December, 8{10, 2006. Proceedings, volume 4301 of Lecture
Notes in Computer Science, pages 90{107. Springer-Verlag, Berlin, 2006.

[84] G. Lawton. Is it ¯nally time to worry about mobile malware. IEEE Computer,
41(5):12{14, 2008.

[85] C.-L. Lei, P.-L. Yu, P.-L. Tsai, and M.-H. Chan. An e±cient and anonymous
buyer-seller watermarking protocol. IEEE Transactions on Image Processing,
13(12):1618{1626, 2004.

[86] S. Li, S. Balfe, J. Zhou, and K. Chen. Enforcing trust in pervasive computing
with trusted computing technology. In J. Lopez, editor, First International
Workshop on Critical Information Infrastructure Security (CRITIS 2006),
Samos, Greece, August 31{September 1, 2006. Proceedings, volume 4347 of
Lecture Notes in Computer Science, pages 195{209. Springer-Verlag, Berlin,
2006.

[87] S. Li, S. Balfe, J. Zhou, and K. Chen. Enforcing trust in pervasive computing.
International Journal of System of Systems Engineering, 1(1-2):96{110, 2008.

[88] H. LÄohr, H. V. Ramasamy, A.-R. Sadeghi, S. Schulz, M. Schunter, and
C. StÄuble. Enhancing grid security using trusted virtualization. In B. Xiao,
L. T. Yang, J. Ma, C. Muller-Schloer, and Y. Hua, editors, 4th International
Conference on Autonomic and Trusted Computing (ATC 2007), Hong Kong,
China, July 11{13, 2007. Proceedings, volume 4610 of Lecture Notes in Com-
puter Science, pages 372{384. Springer-Verlag, Berlin, 2007.

[89] B. M. Macq and J. J. Quisquater. Cryptology for digital TV broadcasting.
Proceedings of the IEEE, 83(6):944{957, 1995.

[90] W. Mao, F. Yan, and C. Chen. Daonity | Grid security with behaviour con-
formity from trusted computing. In Proceedings of the First ACM Workshop
on Scalable Trusted Computing (STC'06), Fairfax, Virginia, US, November 3,
2006, pages 43{46. ACM Press, 2006.

[91] A. Martin and P.-W. Yau. Grid security: Next steps. Information Security
Technical Report, 12(3):113{122, 2007.

[92] K. Matsui and K. Tanaka. Video-steganography: How to secretly embed a
signature in a picture. IMA Intellectual Property Project Proceedings, 1(1):187{
205, 1994.

[93] R. Mayrhofer and H. Gellersen. Shake well before use: Authentication based on
accelerometer data. In A. LaMarca, M. Langheinrich, and K. N. Truong, edi-
tors, 5th International Conference on Pervasive Computing (Pervasive 2007),
Toronto, Ontario, Canada, May 13{16, 2007. Proceedings, volume 4480 of
Lecture Notes in Computer Science, pages 144{161. Springer-Verlag, Berlin,
2007.

[94] J. M. McCune, A. Perrig, and M. K. Reiter. Seeing-is-believing: Using camera
phones for human-veri¯able authentication. In Proceedings of the 2005 IEEE
Symposium of Security and Privacy (SP'05), Oakland, California, USA, May
8{11, 2005, pages 110{124. IEEE Computer Society, 2005.

[95] J. M. McCune, A. Perrig, A. Seshadri, and L. van Doorn. Turtles all the way
down: Research challenges in user-based attestation. In Proceedings of the
2nd USENIX Workshop on Hot Topics in Security (HotSec '07), Boston, MA,
USA, August 7, 2007, 2007.

[96] D. H. McKnight and N. L. Chervany. The meanings of trust.
Technical report, University of Minnesota, Minneaplois, MN, 1996.
http://misrc.umn.edu/wpaper/WorkingPapers/9604.pdf.

[97] N. Memon and P. W. Wong. Protecting digital media content. Communica-
tions of the ACM, 4(7):11{24, 1998.

[98] N. Memon and P. W. Wong. A buyer-seller watermarking protocol. IEEE
Transactions on Image Processing, 10(4):643{649, 2001.

[99] A. J. Menezes, P. C. van Oorschot, and S. A. Vanstone. Handbook of Applied
Cryptography. CRC Press, Boca Raton, FL, USA, 1997.

[100] C. J. Mitchell, editor. Trusted Computing. IEE Press, London, 2005.

[101] W. Mohr. The wireless world research forum | WWRF. Computer Commu-
nications, 26(1):2{10, Jan 2003.

[102] D. Molnar, A. Soppera, and D. Wagner. Privacy for RFID through trusted
computing. In Proceedings of the 2005 ACM Workshop on Privacy in the
Electronic Society (WPES '05), Alexandria, VA, USA, November 7, 2005,
pages 31{34. ACM Press, 2005.

[103] G. E. Moore. Cramming more components onto integrated circuits. Electronics
Magazine, 38(8):114{117, 1965.

[104] M. Myers, R. Ankney, A. Malpani, S. Galperin, and C. Adams. X.509 Internet
public key infrastructure online certi¯cate status protocol (OCSP). Request
for Comments 2560, Internet Engineering Task Force (IETF), June 1999.

[105] National Institute of Standards and Technology (NIST). Federal Information
Processing Standards: Data Encryption Standard (DES). FIPS Publication
46-3, National Institute of Standards and Technology, U.S. Department of
Commerce, Gaithersburg, MD, USA, October 1999.

[106] National Institute of Standards and Technology (NIST). Federal Information
Processing Standards: Advance Encryption Standard (AES). FIPS Publica-
tion 197, National Institute of Standards and Technology, U.S. Department of
Commerce, Gaithersburg, MD, USA, November 2001.

[107] National Institute of Standards and Technology (NIST). Federal Information
Processing Standards: Secure Hash Standard. FIPS Publication 180-2, Na-
tional Institute of Standards and Technology, U.S. Department of Commerce,
Gaithersburg, MD, USA, 2002.

[108] M. Nidd. Service discovery in DEAPspace. IEEE Personal Communications,
8(4):39{45, 2001.

[109] N. Niebert, A. Schieder, H. Abramowicz, G. Malmgren, J. S. C. Prehofer, and
H. Karl. Ambient networks: An architecture for communication beyond 3G.
IEEE Wireless Communications, 11(2):14{22, April 2004.

[110] I. G. Niemegeers and S. M. H. de Groot. Research issues in ad-hoc distributed
personal networking. Wireless Personal Communications, 26(2{3):149{167,
2003.

[111] P. Paillier. Public-key cryptosystems based on composite degree residuos-
ity classes. In J. Stern, editor, Advances in Cryptology | EUROCRYPT
1999, 18th Annual International Conference on the Theory and Applications
of Cryptographic Techniques, Prague, Czech Republic, May 2{6, 1999. Pro-
ceedings, volume 1592 of Lecture Notes in Computer Science, pages 223{238.
Springer-Verlag, Berlin, 1999.

[112] A. Pashalidis and C. J. Mitchell. Single Sign-On using TCG-conformant plat-
forms. In C. J. Mitchell, editor, Trusted Computing, chapter 6, pages 175{193.
IEE Press, London, 2005.

[113] S. Pearson. Trusted agents that enhance user privacy by self-pro¯ling. Tech-
nical Report HPL-2002-196, Hewlett-Packard Laboratories, Bristol, UK, July
2002.

[114] S. Pearson. How trusted computers can enhance for privacy preserving mobile
applications. In Proceedings of the 2005 International Conference on a World
of Wireless, Mobile and Multimedia Networks (WOWMOM 2005): First In-
ternational IEEE WoWMoM Workshop on Trust, Security and Privacy for
Ubiquitous Computing, Taormina, Italy, June 13{16, 2005, pages 609{613.
IEEE Computer Society, 2005.

[115] M. Peinado, P. England, and Y. Chen. An overview of NGSCB. In C. J.
Mitchell, editor, Trusted Computing, chapter 4, pages 115{141. IEE Press,
London, 2005.

[116] C. Perkins, E. Belding-Royer, and S. Das. Ad hoc on-demand distance vector
(AODV) routing. Request for Comments 3561, Internet Engineering Task
Force (IETF), July 2003.

[117] A. P¯tzmann and M. Hansen. Anonymity, unlinkability, unobservabil-
ity, pseudonymity, and identity management: A consolidated proposal
for terminology. Version v0.31, Privacy and Data Security, Faculty of
Computer Science, Institute of Systems Architecture, Technische Univer-
sitÄat Dresden, Germany, Feburary 2008. Available at: http://dud.inf.tu-
dresden.de/Anon Terminology.shtml.

[118] B. P¯tzmann and M. Schunter. Asymmetric ¯ngerprinting. In U. M. Maurer,
editor, Advances in Cryptology | EUROCRYPT 1996, 15th Annual International Conference on the Theory and Applications of Cryptographic Tech-
niques, Zaragoza, Spain, May 12{16, 1996. Proceedings, volume 1070 of Lec-
ture Notes in Computer Science, pages 84{95. Springer-Verlag, Berlin, 1996.

[119] B. P¯tzmann and M. Waidner. Anonymous ¯ngerprinting. In W. Fumy,
editor, Advances in Cryptology | EUROCRYPT 1997, 16th Annual Inter-
national Conference on the Theory and Applications of Cryptographic Tech-
niques, Konstanz, Germany, May 11{15, 1997. Proceedings, volume 1233 of
Lecture Notes in Computer Science, pages 88{102. Springer-Verlag, Berlin,
1997.

[120] F. Piper and S. Murphy. Cryptography: A Very Short Introduction. Oxford
University Press, 2002.

[121] Platform for Privacy Preferences (P3P) Working Group. Platform for Privacy
Preferences (P3P) Speci¯cations. Version 1.1, World Wide Web Consortium
(W3C), MIT, Cambridge, MA, USA, ERCIM, Sophia-Antipolis, France, Keio,
Kanagawa, Japan, November 13 2006. http://www.w3.org/TR/P3P11.

[122] B. Preneel, A. Bosselaers, and H. Dobbertin. The cryptographic hash function
RIPEMD-160. Cryptobytes, 3(2):9{14, 1997.

[123] A. Pridgen and C. Julien. A secure modular mobile agent system. In Pro-
ceedings of the 2006 International Workshop on Software Engineering for
Large-Scale Multi-Agent Systems (SELMAS '06), Shanghai, China, May 22{
23, 2006, pages 67{74. ACM Press, New York, NY, USA, 2006.

[124] G. J. Proudler. Concepts of trusted computing. In C. J. Mitchell, editor,
Trusted Computing, chapter 2, pages 11{27. IEE Press, London, 2005.

[125] L. Qiao and K. Nahrstedt. Watermarking schemes and protocols for protecting
rightful ownership and customer's rights. Journal of Visual Communication
and Image Representation, 9(3):194{210, 1998.

[126] K. Ren, W. Luo, K. Kim, and R. Deng. A novel privacy preserving authenti-
cation and access control scheme for pervasive computing environments. IEEE
Transactions on Vehicular Technology, 55(4):1373{1384, 2006.

[127] R. Rivest, A. Shamir, and L. Adleman. A method for obtaining digital signa-
tures and public key cryptosystems. Communications of the ACM, 21(2):120{
126, 1978.

[128] R. L. Rivest. The md5 message digest algorithm. Request for Comments 1321,
Internet Engineering Task Force (IETF), April 1992.

[129] R. L. Rivest. The RC4 encryption algorithm. Technical report, RSA Data
Security Inc, Redwood City, CA, USA, 1992.

[130] J. Rosenburg, H. Schulzrinne, G. Camarillo, A. Johnston, J. Peterson,
R. Sparks, M. Handley, and E. Schooler. SIP: Session initiation protocol.
RFC 3261, Internet Engineering Task Force, Jun 2002.

[131] RSA Laboratories. PKCS #1: RSA Cryptography Standard. Version 2.1,
RSA Security, Bedford, MA, USA, 2002.

[132] C. Rudolph. Covert identity information in direct anonymous attestation
(DAA). In H. Venter, M. Elo®, L. Labuschagne, J. Elo®, and R. von
Solms, editors, 22nd IFIP TC-11 International Information Security Con-
ference (SEC2007) on \New Approaches for Security, Privacy and Trust in
Complex Environments", Sandton, South Africa, May 14{16, 2007. Proceed-
ings, volume 232 of IFIP International Federation for Information Processing,
pages 443{448. Springer, Boston, 2007.

[133] A.-R. Sadeghi and C. StÄuble. Property-based attestation for computing plat-
forms: Caring about properties, not mechanisms. In Proceedings of the 2004
Workshop on New Security Paradigms (NSPW '04), Nova Scotia, Canada,
September 20{23, 2004, pages 67{77. ACM Press, 2004.

[134] Salutation Consortium. Salutation Architecture Speci¯cation, June 1999.
http://www.salutation.org/.

[135] R. Sandhu and X. Zhang. Peer-to-peer access control architecture using trusted
computing technology. In Proceedings of the Tenth ACM Symposium on Access
Control Models and Technologies (SACMAT '05), Stockholm, Sweden, June
01{03, 2005, pages 147{158. ACM Press, New York, NY, USA, 2005.
[136] R. R. Schell and M. F. Thompson. Platform security: What is lacking? In-
formation Security Technical Report, 5(1):26{41, 2000.

[137] S. Schwiderski-Grosche, A. Tomlinson, and D. B. Pearce. Towards the secure
initialisation of a personal distributed environment. Technical Report RHUL{
MA{2005{9, Mathematics Department, Royal Holloway, University of London,
July 2005.

[138] P. E. Sevin»c, M. Strasser, and D. A. Basin. Securing the distribution and stor-
age of secrets with trusted platform modules. In D. Sauveron, K. Markanton-
akis, A. Bilas, and J.-J. Quisquater, editors, First International Workshop in
Information Security Theory and Practices: Smart Cards, Mobile and Ubiqui-
tous Computing Systems (WISTP 2007), Heraklion, Crete, Greece, May 9{11,
2007. Proceedings, volume 4462 of Lecture Notes in Computer Science, pages
53{66. Springer-Verlag, Berlin, 2007.

[139] E. Shi, A. Perrig, and L. V. Doorn. BIND: A ¯ne-grained attestation service
for secure distributed systems. In Proceedings of the 2005 IEEE Symposium
on Security and Privacy, Oakland, CA, USA, May 8{11, 2005, pages 154{168.
IEEE Press, 2005.

[140] B. Smyth, M. Ryan, and L. Chen. Direct anonymous attestation (DAA):
Ensuring privacy with corrupt administrators. In F. Stajano, C. Meadows,
S. Capkun, and T. Moore, editors, 4th European Workshop on Security and
Privacy in Ad hoc and Sensor Networks (ESAS 2007) Cambridge, UK, July
2{3, 2007. Proceedings, volume 4572 of Lecture Notes in Computer Science,
pages 218{231. Springer-Verlag, Berlin, 2007.

[141] C. Soriente, G. Tsudik, and E. Uzun. BEDA: Button-enabled device as-
sociation. In Proceedings of UbiComp 2007 Workshops: First International
Workshop on Security for Spontaneous Interaction (IWSSI 2007), Innsbruck,
Austria, September 16, 2007, pages 443{449, 2007.

[142] W. Stallings. Network Security Essentials: Applications and Standards. Pear-
son Prentice Hall, Upper Saddle River, New Jersey, USA, third edition, 2007.

[143] F. Stumpf, C. Eckert, and S. Balfe. Towards secure e-commerce based on
virtualization and attestation techniques. In Proceedings of the The Third In-
ternational Conference on Availability, Reliability and Security (ARES 2008),
Barcelona, Spain, March 4{7, 2008, pages 376{382. IEEE Computer Society,
2008.

[144] Sun Microsystems. Jini Architecture Speci¯cation. Version
1.2, Sun Microsystems, Palo Alto, CA, USA, December 2001.
http://www.sun.com/software/jini/specs/.

[145] F. Swiderski and W. Snyder. Threat Modeling. Microsoft Press, Redmond,
Washington, 2004.

[146] Symantec Enterprise Security. Symantec Global Internet Security Threat Re-
port: Trends for July{December 07. Volume XIII, Symantec Corporation,
Cupertino, CA, USA, April 2008.

[147] I. Teranishi, J. Furukawa, and K. Sako. k-times anonymous authentication. In
P. J. Lee, editor, Advances in Cryptology | ASIACRYPT 2004, 10th Interna-
tional Conference on the Theory and Application of Cryptology and Informa-
tion Security, Jeju Island, Korea, December 5{9, 2004. Proceedings, volume
3329 of Lecture Notes in Computer Science, pages 308{322. Springer-Verlag,
Berlin, 2004.

[148] M. S. Thompson and S. F. Midki®. Service description for pervasive ser-
vice discovery. In Proceedings of the 25th IEEE International Conference on
Distributed Computing Systems Workshops: First International Workshop on
Services and Infrastructure for the Ubiquitous and Mobile Internet (SIUMI)
(ICDCSW'05), Columbus, Ohio, USA, June 6{10, 2005, pages 273{279. IEEE
Computer Society, 2005.

[149] P. Tomsich and S. Katzenbeisser. Towards a robust and de-centralized dig-
ital watermarking infrastructure for the protection of intellectual property.
In K. Bauknecht, S. K. Madria, and G. Pernul, editors, First International
Conference on Electronic Commerce and Web Technologies (EC-Web 2000),
London, UK, September 4{6, 2000. Proceedings, volume 1875 of Lecture Notes
in Computer Science, pages 38{47. Springer-Verlag, Berlin, 2000.

[150] Trusted Computing Group (TCG). TPM v1.2 Speci¯cation Changes. A sum-
mary of changes, Trusted Computing Group, Portland, Oregon, USA, October
2003.

[151] Trusted Computing Group (TCG). TCG Speci¯cation Architecture Overview.
Version 1.2, The Trusted Computing Group, Portland, Oregon, USA, April
2004.

[152] Trusted Computing Platform Alliance (TCPA). TCPA Main Speci¯cation.
Version 1.1b, Trusted Computing Group, Portland, Oregon, USA, February
2002.

[153] Universal Plug and Play (UPnP) Forum. UPnP Device Architecture. version
1.0, December 2003. http://www.upnp.org/.

[154] R. G. van Schyndel, A. Z. Tirkel, and C. F. Osbourne. A digital watermark. In
Proceedings of the IEEE Conference on Image Processing (ICIP'94), Austin,
Texas, USA, November 13{16, 1994, pages 86{90. IEEE Press, 1994.

[155] G. Voyatzis and I. Pitas. The use of watermarks in the protection of digital
multimedia products. IEEE Proceedings, 87:1197{1207, 1999.

[156] M. Walker and T. Wright. Security. In F. Hillebrand, editor, GSM and UMTS:
The Creation of Global Mobile Communication, chapter 15, pages 385{406.
John Wiley & Sons, New York, 2002.

[157] M. Weiser. The computer for the twenty-¯rst century. Scienti¯c American,
265(3):94{104, 1991.

[158] M. Wu and A. Friday. Integrating privacy enhancing services in ubiquitous
computing environments. In Proceedings of the 4th International UbiComp
Workshop (UBICOMP 2002): Security in Ubiquitous Computing, Goteborg,
Sweden, September 29 { October 1, 2002, pages 1{5, 2002.

[159] E. D. Yan. Zero con¯guration networking. The Internet Protocol Journal,
5(4):20{26, 2002.

[160] Z. Yan and P. Cofta. A mechanism for trust sustainability among trusted
computing platforms. In S. Katsikas, J. Lopez, and G. Pernul, editors, First
International Conference on Trust and Privacy in digital Business (TrustBus
2004), Zaragoza, Spain, August 30 { September 1, 2004. Proceedings, volume
3184 of Lecture Notes in Computer Science, pages 11{19. Springer-Verlag,
Berlin, 2004.

[161] P.-W. Yau and A. Tomlinson. Using trusted computing in commercial grids.
In U. Priss, S. Polovina, and R. Hill, editors, 15th International Conference on Conceptual Structures (ICCS 2007), She±eld, UK, July 22{27, 2007, Pro-
ceedings, volume 4604 of Lecture Notes in Computer Science, pages 31{36.
Springer-Verlag, Berlin, 2007.

[162] P.-W. Yau, A. Tomlinson, S. Balfe, and E. M. Gallery. Securing grid work°ows
with trusted computing. In M. Bubak, G. dick van Albada, P. M. A. Sloot,
and J. J. Dongarra, editors, 8th International Conference on Computer Science
(ICCS '08), Krak¶ow, Poland, June 23{25, 2008, Proceedings, Part III, volume
5103 of Lecture Notes in Computer Science, pages 510{519. Springer-Verlag,
Berlin, 2008.

[163] J. Zhang, W. Kou, and K. Fan. Secure Buyer-Seller Watermarking Protocol.
IEE Proceedings on Information Security, 153(1):15{18, 2006.

[164] F. Zhu, M. Mutka, and L. Li. Service discovery in pervasive computing envi-
ronments. IEEE Pervasive Computing, 4(4):81{90, 2005.

[165] F. Zhu, M. Mutka, and L. Ni. Prudent Exposure: A private and user-centric
service discovery protocol. In Proceedings of the Second IEEE Conference on
Pervasive Computing and Communications (PerCom'04), Orlando, Florida,
March 14{17, 2004, pages 329{328. IEEE Computer Society, 2004.

[166] F. Zhu, M. Mutka, and L. Ni. A private, secure and user-centric information
exposure model for service discovery protocols. IEEE Transactions on Mobile
Computing, 5(4):418{429, 2006.

[167] F. Zhu, W. Zhu, M. W. Mutka, and L. Ni. Expose or not? A progressive expo-
sure approach for service discovery in pervasive computing environments. In
Proceedings of the Third IEEE International Conference on Pervasive Com-
puting and Communications (PerCom 2005), Kauai Island, Hawaii, March
8{12, 2005, pages 225{234. IEEE Computer Society, 2005.


Details