4 sonuçlar
Arama Sonuçları
Listeleniyor 1 - 4 / 4
Yayın A tokenization-based communication architecture for HCE-Enabled NFC services(Hindawi Publishing Cor, 2016) Özdenizci Köse, Büşra; Ok, Kerem; Coşkun, VedatFollowing the announcement of Host Card Emulation (HCE) technology, card emulation mode based Near Field Communication (NFC) services have gained further appreciation as an enabler of the Cloud-based Secure Element (SE) concept. A comprehensive and complete architecture with a centralized and feasible business model for diverse HCE-based NFC services will be highly appreciated, particularly by Service Providers and users. To satisfy the need in this new emerging research area, a Tokenization-based communication architecture for HCE-based NFC services is presented in this paper. Our architecture proposes Two-Phased Tokenization to enable the identity management of both user and Service Provider. NFC Smartphone users can store, manage, and make use of their sensitive data on the Cloud for NFC services; Service Providers can also provide diverse card emulation NFC services easily through the proposed architecture. In this paper, we initially present the Two-Phased Tokenization model and then validate the proposed architecture by providing a case study on access control. We further evaluate the usability aspect in terms of an authentication scheme. We then discuss the ecosystem and business model comprised of the proposed architecture and emphasize the contributions to ecosystem actors. Finally, suggestions are provided for data protection in transit and at rest.Yayın SIMSec: A key exchange protocol between SIM card and service provider(Springer New York LLC, 2016-08-01) Ok, Kerem; Coşkun, Vedat; Yarman, Bekir Sıddık Binboğa; Çevikbaş, Cem; Özdenizci Köse, BüşraMobile technology is so popular and overdosed adoption is inevitable in today’s world. As the mobile technologies have advanced, Service Providers (SP) have offered services via Smartphones and some of them required secure data communication between the Subscriber Identity Module (SIM) cards on Smartphones and the servers of SP. The latest SIM cards comply with recent specifications including secure domain generation, mobile signatures, pre-installed encryption keys, and other useful security services. Nevertheless, un-keyed SIM cards do not satisfy such requirements, thus end-to-end encryption between the SIM card and SP cannot be provided. In this paper, we provide a key exchange protocol, which creates a symmetric key through the collaborative work of the SIM card and the SP server. After a successful protocol performance, the SIM card and SP can perform end-to-end data encryption. After defining the protocol, we also discuss the security issues and provide a formal security analysis of the protocol using the Casper/FDR tool.Yayın A role-based service level NFC ecosystem model(Springer, 2013-02) Ok, Kerem; Coşkun, Vedat; Özdenizci Köse, Büşra; Aydın, Mehmet NafizNear Field Communication (NFC) is a short range wireless communication technology allowing to communicate mobile devices within close proximity. It provides opportunity for service providers to offer various value added services to customers. NFC technology allows the usage of wide range of applications and eliminates the obligation to carry additional components other than the mobile device such as credit or payment cards, tickets, identification cards or keys. Despite its technological advantages over alternative ones, the NFC business ecosystems and services are yet to take off. The problems mainly arise with the business issues triggered by different and mostly conflicting needs of many actors in the ecosystem and several additional technical issues. In this study, by adopting a role-based service ecosystem modeling, we propose an NFC ecosystem model which perfectly specifies the roles in the ecosystem, and defines set of activities for each role, and communication structure. We analyzed NFC ecosystem in three phases as pre-installation, installation, and service usage. We have defined the activities and communication structure in the first two phases, and finally investigated the service usage phase in three different operating modes of NFC. After giving the details of the proposed ecosystem model, two use cases are given to validate the developed ecosystem model. We complete our study by discussing the requirement satisfaction.Yayın Design of a key exchange protocol between SIM card and service provider(Institute of Electrical and Electronics Engineers Inc., 2015-11-05) Ok, Kerem; Coşkun, Vedat; Çevikbaş, Cem; Özdenizci Köse, BüşraCurrent capabilities of smart cards, Smartphones, and cellular network provoke companies to provide vast amount of services to the mobile users. Some of those services require end-to-end encryption between a Service Provider and a SIM card. Keyed SIM cards already contain the required structure for secure key generation and upload, whereas un-keyed SIM cards do not have the required capability for this. In this paper, we provide a key exchange protocol, which creates a symmetric key by the collaborative work of SIM card and the Service Provider server. After a successful protocol run, SIM card and Service Provider can perform end-to-end data encryption.












