Security and Privacy in Mobile Information and Communication Systems. First International ICST Conference, MobiSec 2009, Turin, Italy, June 3-5, 2009, Revised Selected Papers

Research Article

Security Aspects of Smart Cards vs. Embedded Security in Machine-to-Machine (M2M) Advanced Mobile Network Applications

Download87 downloads
  • @INPROCEEDINGS{10.1007/978-3-642-04434-2_19,
        author={Mike Meyerstein and Inhyok Cha and Yogendra Shah},
        title={Security Aspects of Smart Cards vs. Embedded Security in Machine-to-Machine (M2M) Advanced Mobile Network Applications},
        proceedings={Security and Privacy in Mobile Information and Communication Systems. First International ICST Conference, MobiSec 2009, Turin, Italy, June 3-5, 2009, Revised Selected Papers},
        proceedings_a={MOBISEC},
        year={2012},
        month={5},
        keywords={Smart card UICC machine-to-machine communication embedded security trusted environment},
        doi={10.1007/978-3-642-04434-2_19}
    }
    
  • Mike Meyerstein
    Inhyok Cha
    Yogendra Shah
    Year: 2012
    Security Aspects of Smart Cards vs. Embedded Security in Machine-to-Machine (M2M) Advanced Mobile Network Applications
    MOBISEC
    Springer
    DOI: 10.1007/978-3-642-04434-2_19
Mike Meyerstein1,*, Inhyok Cha1,*, Yogendra Shah1,*
  • 1: King of Prussia
*Contact email: meyersmv@btinternet.com, Inhyok.Cha@InterDigital.com, Yogendra.Shah@InterDigital.com

Abstract

The Third Generation Partnership Project (3GPP) standardisation group currently discusses advanced applications of mobile networks such as Machine-to-Machine (M2M) communication. Several security issues arise in these contexts which warrant a fresh look at mobile networks’ security foundations, resting on smart cards. This paper contributes a security/efficiency analysis to this discussion and highlights the role of trusted platform technology to approach these issues.