Abstract
The SIM cards are going through several new enhancements both in the underlying hardware and its capabilities. They are becoming secure wireless networked devices containing embedded sensors. This paper assess how this new capabilities together with the pervasiveness and security of the SIM card can support the development and design of trust-based applications. Moreover, we present a specific use-case around a seamless trust builder for social networks, which makes use of sensed inputs towards building hard contextual evidences to trust relations. We conclude with the description of the challenges of building this evidence based trust-builder and the necessary steps to going from the prototype we developed to a real application which may accurately describe trust relations.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
Breslin, J., Decker, S.: The future of social networks on the internet: The need for semantics. IEEE Internet Computing 11(6), 86–90 (2007)
Beattie, R.: Linking out after two years of linked in (2005), http://www.russellbeattie.com/notebook/1008411.html (Last accessed: 31/05/09)
Ann Golbeck, J.: Computing and applying trust in web-based social networks. PhD thesis, University of Maryland, College Park (2005)
Renaudin, M., Bouesse, F., Proust, P., Tual, J.P., Sourgen, L., Germain, F.: High security smartcards. In: DATE 2004: Proceedings of the conference on Design, automation and test in Europe, p. 10228. IEEE Computer Society, Washington (2004)
Markantonakis, C., Mayes, K., Tunstall, M., Sauveron, D., Piper, F.: Smart card security. In: Nedjah, N., Abraham, A., de Macedo Mourelle, L. (eds.) Computational Intelligence in Information Assurance and Security. Studies in Computational Intelligence, vol. 57, pp. 201–233. Springer, Heidelberg (2007)
GlobalPlatform Inc.: GlobalPlatform, Card Specification Version 2.2 (March 2006)
ETSI: ETSI TS 102 483: Smart cards; UICC-Terminal interface; Internet Protocol connectivity between UICC and terminal V8.1.0 (April 2009)
Eisl, F.: Smart card security services for an open application environment used in mobile phones (June 2004)
OMA: Smart Card Web Service Standard Version 1.1 (2009)
ETSI: ETSI TS 102 613: Smart Cards; UICC - Contactless Front-end (CLF) Interface; Part 1: Physical and data link layer characteristics V7.5.0 (April 2009)
ETSI: ETSI TS 102 622: Smart cards; Smart Cards; UICC - Contactless Front-end (CLF) Interface; Host Controller Interface (HCI) V7.4.0 (April 2009)
PRNewswire.com: Oberthur technologies announces simsense - the first motion detection sim card (2009), http://news.prnewswire.com/ViewContent.aspx?ACCT=109&STORY=/www/story/02-16-2009/0004972701&EDATE= (Last accessed: 31/05/09)
Cellular-news: Sagem to embed gps receiver into sim cards (2008), http://www.cellular-news.com/story/34691.php (Last accessed: 31/05/2009)
Brede, S.: ETSI Workshop presentation June 4-5, 2008 A couple of M2M activities: WLANSIM a wireless IP networked UICC. Telenor R & I (2008)
Turolla, M., Alessio, E.: Presentation ZSIM enabling innovative services to improve quality of life. Telecom Italia – Innovation & Engineering (2006)
3GPP: ETSI TR 133 980: Digital cellular telecommunications system (Phase 2+); Universal Mobile Telecommunications System (UMTS); Liberty Alliance and 3GPP security interworking; Interworking of Liberty Alliance Identity Federation Framework (ID-FF), Identity Web Services Framework (ID-WSF) and Generic Authentication Architecture (GAA) V7.6.0 (October 2007)
Sun Microsystems, Inc.: Runtime Environment Specification: Java (TM) Platform, Version 3.0, Connected Edition (March 2008)
Johannessen, T.: Identity management in general and with attention to mobile gsm-based systems. Telektronikk, 31–51 (2007)
GSM Association.: Identity Management Framework Document V1.1 (2008)
Stutzman, F.: An evaluation of identity-sharing behavior in social network communities. Journal of the International Digital Media and Arts Association (2006)
Fogel, J., Nehmad, E.: Internet social network communities: Risk taking, trust, and privacy concerns. Computers in Human Behavior 25(1), 153–160 (2009)
Korpipää, P., Mäntyjärvi, J., Kela, J., Keränen, H., Malm, E.J.: Managing context information in mobile devices. IEEE Pervasive Computing 2(3), 42–51 (2003)
Schmidt, A., Laerhoven, K.V.: How to build smart appliances. IEEE Personal Communications 8, 66–71 (2001)
Hristova, A.: Conceptualization and design of a context-aware platform for user-centric applications (June 2008)
Mayes, K.E., Markantonakis, K.: On the potential of high density smart cards. Information Security Technical Report 11(3), 147–153 (2006)
Katz, Y., Golbeck, J.: Using social network-based trust for default reasoning on the web
Taherian, M., Amini, M., Jalili, R.: Trust inference in web-based social networks using resistive networks. In: ICIW 2008: Proceedings of the 2008 Third International Conference on Internet and Web Applications and Services, pp. 233–238. IEEE Computer Society, Washington (2008)
Bražinskas, R.: Towards context awareness using mobile sensors (2008)
Chang, E., Dillon, T., Hussain, F.: Trust and reputation for service-oriented environments: technologies for building business intelligence and consumer confidence. Wiley, Chichester (2006)
Karantonis, D.M., Narayanan, M.R., Mathie, M., Lovell, N.H., Celler, B.G.: Implementation of a real-time human movement classifier using a triaxial accelerometer for ambulatory monitoring. IEEE Transactions on Information Technology in Biomedicine 10(1), 156–167 (2006)
AlNemr, R., Meinel, C.: Getting more from reputation systems: A context-aware reputation framework based on trust centers and agent lists. In: International Multi-Conference on Computing in the Global Information Technology, pp. 137–142 (2008)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2009 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Vilarinho, T., Haslum, K., Noll, J. (2009). Advanced SIM Capabilities Supporting Trust-Based Applications. In: Jøsang, A., Maseng, T., Knapskog, S.J. (eds) Identity and Privacy in the Internet Age. NordSec 2009. Lecture Notes in Computer Science, vol 5838. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-04766-4_16
Download citation
DOI: https://doi.org/10.1007/978-3-642-04766-4_16
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-04765-7
Online ISBN: 978-3-642-04766-4
eBook Packages: Computer ScienceComputer Science (R0)