Skip to main content

Advanced SIM Capabilities Supporting Trust-Based Applications

  • Conference paper

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 5838))

Abstract

The SIM cards are going through several new enhancements both in the underlying hardware and its capabilities. They are becoming secure wireless networked devices containing embedded sensors. This paper assess how this new capabilities together with the pervasiveness and security of the SIM card can support the development and design of trust-based applications. Moreover, we present a specific use-case around a seamless trust builder for social networks, which makes use of sensed inputs towards building hard contextual evidences to trust relations. We conclude with the description of the challenges of building this evidence based trust-builder and the necessary steps to going from the prototype we developed to a real application which may accurately describe trust relations.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Breslin, J., Decker, S.: The future of social networks on the internet: The need for semantics. IEEE Internet Computing 11(6), 86–90 (2007)

    Article  Google Scholar 

  2. Beattie, R.: Linking out after two years of linked in (2005), http://www.russellbeattie.com/notebook/1008411.html (Last accessed: 31/05/09)

  3. Ann Golbeck, J.: Computing and applying trust in web-based social networks. PhD thesis, University of Maryland, College Park (2005)

    Google Scholar 

  4. Renaudin, M., Bouesse, F., Proust, P., Tual, J.P., Sourgen, L., Germain, F.: High security smartcards. In: DATE 2004: Proceedings of the conference on Design, automation and test in Europe, p. 10228. IEEE Computer Society, Washington (2004)

    Google Scholar 

  5. Markantonakis, C., Mayes, K., Tunstall, M., Sauveron, D., Piper, F.: Smart card security. In: Nedjah, N., Abraham, A., de Macedo Mourelle, L. (eds.) Computational Intelligence in Information Assurance and Security. Studies in Computational Intelligence, vol. 57, pp. 201–233. Springer, Heidelberg (2007)

    Chapter  Google Scholar 

  6. GlobalPlatform Inc.: GlobalPlatform, Card Specification Version 2.2 (March 2006)

    Google Scholar 

  7. ETSI: ETSI TS 102 483: Smart cards; UICC-Terminal interface; Internet Protocol connectivity between UICC and terminal V8.1.0 (April 2009)

    Google Scholar 

  8. Eisl, F.: Smart card security services for an open application environment used in mobile phones (June 2004)

    Google Scholar 

  9. OMA: Smart Card Web Service Standard Version 1.1 (2009)

    Google Scholar 

  10. ETSI: ETSI TS 102 613: Smart Cards; UICC - Contactless Front-end (CLF) Interface; Part 1: Physical and data link layer characteristics V7.5.0 (April 2009)

    Google Scholar 

  11. ETSI: ETSI TS 102 622: Smart cards; Smart Cards; UICC - Contactless Front-end (CLF) Interface; Host Controller Interface (HCI) V7.4.0 (April 2009)

    Google Scholar 

  12. PRNewswire.com: Oberthur technologies announces simsense - the first motion detection sim card (2009), http://news.prnewswire.com/ViewContent.aspx?ACCT=109&STORY=/www/story/02-16-2009/0004972701&EDATE= (Last accessed: 31/05/09)

  13. Cellular-news: Sagem to embed gps receiver into sim cards (2008), http://www.cellular-news.com/story/34691.php (Last accessed: 31/05/2009)

  14. Brede, S.: ETSI Workshop presentation June 4-5, 2008 A couple of M2M activities: WLANSIM a wireless IP networked UICC. Telenor R & I (2008)

    Google Scholar 

  15. Turolla, M., Alessio, E.: Presentation ZSIM enabling innovative services to improve quality of life. Telecom Italia – Innovation & Engineering (2006)

    Google Scholar 

  16. 3GPP: ETSI TR 133 980: Digital cellular telecommunications system (Phase 2+); Universal Mobile Telecommunications System (UMTS); Liberty Alliance and 3GPP security interworking; Interworking of Liberty Alliance Identity Federation Framework (ID-FF), Identity Web Services Framework (ID-WSF) and Generic Authentication Architecture (GAA) V7.6.0 (October 2007)

    Google Scholar 

  17. Sun Microsystems, Inc.: Runtime Environment Specification: Java (TM) Platform, Version 3.0, Connected Edition (March 2008)

    Google Scholar 

  18. Johannessen, T.: Identity management in general and with attention to mobile gsm-based systems. Telektronikk, 31–51 (2007)

    Google Scholar 

  19. GSM Association.: Identity Management Framework Document V1.1 (2008)

    Google Scholar 

  20. Stutzman, F.: An evaluation of identity-sharing behavior in social network communities. Journal of the International Digital Media and Arts Association (2006)

    Google Scholar 

  21. Fogel, J., Nehmad, E.: Internet social network communities: Risk taking, trust, and privacy concerns. Computers in Human Behavior 25(1), 153–160 (2009)

    Article  Google Scholar 

  22. Korpipää, P., Mäntyjärvi, J., Kela, J., Keränen, H., Malm, E.J.: Managing context information in mobile devices. IEEE Pervasive Computing 2(3), 42–51 (2003)

    Article  Google Scholar 

  23. Schmidt, A., Laerhoven, K.V.: How to build smart appliances. IEEE Personal Communications 8, 66–71 (2001)

    Article  Google Scholar 

  24. Hristova, A.: Conceptualization and design of a context-aware platform for user-centric applications (June 2008)

    Google Scholar 

  25. Mayes, K.E., Markantonakis, K.: On the potential of high density smart cards. Information Security Technical Report 11(3), 147–153 (2006)

    Article  Google Scholar 

  26. Katz, Y., Golbeck, J.: Using social network-based trust for default reasoning on the web

    Google Scholar 

  27. Taherian, M., Amini, M., Jalili, R.: Trust inference in web-based social networks using resistive networks. In: ICIW 2008: Proceedings of the 2008 Third International Conference on Internet and Web Applications and Services, pp. 233–238. IEEE Computer Society, Washington (2008)

    Chapter  Google Scholar 

  28. Bražinskas, R.: Towards context awareness using mobile sensors (2008)

    Google Scholar 

  29. Chang, E., Dillon, T., Hussain, F.: Trust and reputation for service-oriented environments: technologies for building business intelligence and consumer confidence. Wiley, Chichester (2006)

    Book  Google Scholar 

  30. Karantonis, D.M., Narayanan, M.R., Mathie, M., Lovell, N.H., Celler, B.G.: Implementation of a real-time human movement classifier using a triaxial accelerometer for ambulatory monitoring. IEEE Transactions on Information Technology in Biomedicine 10(1), 156–167 (2006)

    Article  Google Scholar 

  31. AlNemr, R., Meinel, C.: Getting more from reputation systems: A context-aware reputation framework based on trust centers and agent lists. In: International Multi-Conference on Computing in the Global Information Technology, pp. 137–142 (2008)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2009 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Vilarinho, T., Haslum, K., Noll, J. (2009). Advanced SIM Capabilities Supporting Trust-Based Applications. In: Jøsang, A., Maseng, T., Knapskog, S.J. (eds) Identity and Privacy in the Internet Age. NordSec 2009. Lecture Notes in Computer Science, vol 5838. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-04766-4_16

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-04766-4_16

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-04765-7

  • Online ISBN: 978-3-642-04766-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics