Skip to main content

Security Aspects of Smart Cards vs. Embedded Security in Machine-to-Machine (M2M) Advanced Mobile Network Applications

  • Conference paper
Security and Privacy in Mobile Information and Communication Systems (MobiSec 2009)

Abstract

The Third Generation Partnership Project (3GPP) standardisation group currently discusses advanced applications of mobile networks such as Machine-to-Machine (M2M) communication. Several security issues arise in these contexts which warrant a fresh look at mobile networks’ security foundations, resting on smart cards. This paper contributes a security/efficiency analysis to this discussion and highlights the role of trusted platform technology to approach these issues.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 3GPP TSG WG3 unapproved draft technical report TR33.812 (current version 8.0.0) Feasibility Study on Remote Management of USIM Application on M2M Equipment (this is a working title which can change at any time)

    Google Scholar 

  2. 3GPP TS 31.102; Characteristics of the USIM Application

    Google Scholar 

  3. 3GPP TS 31.103; Characteristics of the ISIM Application

    Google Scholar 

  4. ETSI TS 102 221: UICC-Terminal interface; Physical and logical characteristics

    Google Scholar 

  5. ETSI TS 102 484 Smart Cards; Secure Channel between a UICC and an end-point Terminal

    Google Scholar 

  6. ETSI TS 33.110 Key establishment between a UICC and a terminal

    Google Scholar 

  7. ISO 7816-1 Identification cards – Integrated Circuit Cards - physical characteristics

    Google Scholar 

  8. ISO 7816-2 Identification cards – Integrated Circuit Cards - dimensions and location of contacts. AMD1= assignment of C4 and C8 (2004)

    Google Scholar 

  9. ISO 7816-3 Identification cards – Integrated Circuit Cards - electrical interface & Tx protocols

    Google Scholar 

  10. Global Platform specifications, v 2.2, may be, downloaded from http://www.globalplatform.org

  11. 3GPP TS 23.048 Security Mechanisms for SIM Toolkit Application; Stage 2. N.B. this has been recently split up and its former contents have been dispersed over [18], [19], TS 31.115 Secured Packet Structure for (U)SIM Toolkit applications and TS 31.116 Remote APDU Structure for (U)SIM Toolkit applications. TS23.048 is still widely referred to in the telecoms sector

    Google Scholar 

  12. Java community specification JSR177: Security And Trust Services API

    Google Scholar 

  13. ETSI TS 102 600: Characteristics of the USB Interface

    Google Scholar 

  14. Rankl, Effing: The Smart Card Handbook, 3rd edn. Wiley and Sons, Chichester

    Google Scholar 

  15. See, http://www.gsmworld.com

  16. Eurosmart: Smart Card IC Protection Profile, PP-0002, first published (2001) (EAL4 augmented)

    Google Scholar 

  17. CEN standard EN726 Identification card systems. Telecommunications. Integrated circuit(s) cards and terminals. There are 7 parts to this standard

    Google Scholar 

  18. ETSI TS 102 225: Secured packet structure for UICC based applications

    Google Scholar 

  19. ETSI TS 102 226: Remote APDU structure for UICC based applications

    Google Scholar 

  20. ISO 7816-4 Identification cards – Integrated Circuit Cards -Organisation, security and commands for interchange

    Google Scholar 

  21. ISO 7816-8 Identification cards – Integrated Circuit Cards - Commands for security operations

    Google Scholar 

  22. Current specifications for ID-FF and ID-WSF, www.projectliberty.org

  23. TS 102 483: UICC-Terminal interface; Internet Protocol connectivity between UICC and terminal

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2009 ICST Institute for Computer Science, Social Informatics and Telecommunications Engineering

About this paper

Cite this paper

Meyerstein, M., Cha, I., Shah, Y. (2009). Security Aspects of Smart Cards vs. Embedded Security in Machine-to-Machine (M2M) Advanced Mobile Network Applications. In: Schmidt, A.U., Lian, S. (eds) Security and Privacy in Mobile Information and Communication Systems. MobiSec 2009. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 17. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-04434-2_19

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-04434-2_19

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-04433-5

  • Online ISBN: 978-3-642-04434-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics