22
Key2Share: NFC-enabled Smartphone-based Access Control Alexandra Dmitrienko Cyberphysical Mobile Systems Security Group Fraunhofer SIT, Darmstadt In collaboration with TU Darmstadt, Center for Advanced Security Research in Darmstadt (CASED), Intel Collaborative Research Institute for Secure Computing (ICRI-SC) at TU-Darmstadt, Bosch Security Systems

Key2 share moosecon

Embed Size (px)

Citation preview

Page 1: Key2 share moosecon

Key2Share: NFC-enabled Smartphone-based Access Control

Alexandra Dmitrienko

Cyberphysical Mobile Systems Security Group Fraunhofer SIT, Darmstadt

In collaboration with TU Darmstadt, Center for Advanced Security Research in Darmstadt (CASED), Intel Collaborative Research Institute for

Secure Computing (ICRI-SC) at TU-Darmstadt, Bosch Security Systems

Page 2: Key2 share moosecon

+ NFC =

Near Field Communication (NFC) Applications

mPayments

services in one touch

mTicketing

Page 3: Key2 share moosecon

+ NFC =

Why not Using a Smartphone as a Key?

Page 4: Key2 share moosecon

Smartphone as a Door Key

Access control by enterprises to their facilities

Access control in private sector (houses, garages)

4

Page 5: Key2 share moosecon

Access to hotel rooms

5

Smartphone as a Door Key

Page 6: Key2 share moosecon

Smartphone as a Car Key/Immobilizer Fleet management by enterprises

Car sharing with family members or friends

6

Page 7: Key2 share moosecon

Smartphone as a Car Key/Immobilizer

Car sharing by rental/car sharing companies

7

Page 8: Key2 share moosecon

Smartphone for Access to Storage Facilities

Access to safes in hotel rooms

Lockers in luggage storage at train stations/airports

8

DHL packing stations

Page 9: Key2 share moosecon

Smartphone for Access to Storage Facilities

DHL packstations

9

Page 10: Key2 share moosecon

Smartphone for Access to Facilities

E.g., parking houses

10

Page 11: Key2 share moosecon

Usual Keys vs. SmartCards vs. Key2Share

11

Usual Keys SmartCards Key2Share

Distribution Requires physical

access

Requires physical

access

Remote

Revocation Requires physical

access or replacement

of the lock

Remote

Remote

Delegation Not possible Not possible Possible

Context-aware

access (e.g.,

time frame)

Not possible Possible Possible

Page 12: Key2 share moosecon

Key2Share: System Architecture

12

Issuer

Key2Share web-service

Resources

1. Employ the employee/sell the car Users

Delegated users

5. S

har

e ke

y

3. Electronic key issued

4. User Authentication with the issued key

6. User Authentication with the shared key

2. One-time registration

Page 13: Key2 share moosecon

Key Sharing The key to be shared is represented as a QR-code

Can be sent to the recipient per e-mail, MMS or scanned by a camera of another device

Page 14: Key2 share moosecon

QR Code: What’s Inside?

14

Electronic keys of Key2Share are similar to passports

Issued by a central authority Government Enterprise

Issued for a particular entity Citizen Employee

Has binding to an identity of an entity it is issued for

Photo Cryptographic key

bound to the platform

Public (not a secret) Yes Yes (encrypted)

Page 15: Key2 share moosecon

Key2Share Security

Platform Security

15

Secure communication protocols

Page 16: Key2 share moosecon

Protocol Security

16

Well-established cryptographic primitives (AES, SHA-1, RSA)

Formal security proof of the protocols

Formal tool-aided verification of protocols

Page 17: Key2 share moosecon

Platform Security

Different trade-offs between security and requirements to a mobile device

17

Built-in Security Mechanisms of Mobile OS

System level software-based security extensions

Hardware-based security extensions

More secure Less secure

No extra requirements to mobile hardware and system software (e.g., operating system)

Requires update of system software (e.g., OS)

Requires support in hardware. Available only on some mobile platforms

Page 19: Key2 share moosecon

Supported Platforms

Android NFC-enabled platforms (e.g., Samsung Nexus S, Galaxy S3)

19

Page 20: Key2 share moosecon

Flexible access rights:

policy-based

easy delegation

remote revocation

managable

Summary

Page 21: Key2 share moosecon

Proof of Concept with Bosch Security Systems:

Key2Share as Access Pass

Key2Share as Building Block in Bosch‘s

„Access-Control-as-a-Service“

Compatibility with already deployed

infrastructure (wireless readers, management

software)

Current Work

Page 22: Key2 share moosecon

Thank you [email protected]

22