SlideShare a Scribd company logo
Key2Share: NFC-enabled
Smartphone-based Access Control
                      Alexandra Dmitrienko
       Cyberphysical Mobile Systems Security Group
               Fraunhofer SIT, Darmstadt



   In collaboration with TU Darmstadt, Center for Advanced Security
Research in Darmstadt (CASED), Intel Collaborative Research Institute for
 Secure Computing (ICRI-SC) at TU-Darmstadt, Bosch Security Systems
Near Field Communication (NFC)
          Applications

                + NFC =
      services in one touch



    mPayments        mTicketing
Why not Using a Smartphone as a Key?


                 + NFC =
Smartphone as a Door Key
 Access control by enterprises to their facilities
 Access control in private sector (houses, garages)




                                                       4
Smartphone as a Door Key
 Access to hotel rooms




                                   5
Smartphone as a Car Key/Immobilizer
 Fleet management by enterprises
 Car sharing with family members or friends




                                               6
Smartphone as a Car Key/Immobilizer
 Car sharing by rental/car sharing companies




                                                7
Smartphone for Access to Storage
             Facilities
 Access to safes in hotel rooms
 Lockers in luggage storage at train stations/airports


                      DHL packing stations




                                                          8
Smartphone for Access to Storage
             Facilities
 DHL packstations




                                      9
Smartphone for Access to Facilities
 E.g., parking houses




                                        10
Usual Keys vs. SmartCards vs. Key2Share
                     Usual Keys             SmartCards        Key2Share



 Distribution    Requires physical       Requires physical   Remote
                 access                  access
 Revocation      Requires physical       Remote              Remote
                 access or replacement
                 of the lock
 Delegation      Not possible            Not possible        Possible


 Context-aware   Not possible            Possible            Possible
 access (e.g.,
 time frame)

                                                                          11
Key2Share: System Architecture
 Issuer                   1. Employ the employee/sell the car
                                                                    Users

            Key2Share         2. One-time registration
            web-service
                            3. Electronic key issued




                                                                     5. Share key
                              4. User Authentication
                                with the issued key

                              6. User Authentication
                               with the shared key
Resources

                                                                Delegated users
                                                                                    12
Key Sharing
 The key to be shared is represented as a QR-code
    Can be sent to the recipient per e-mail, MMS
     or scanned by a camera of another device
QR Code: What’s Inside?
 Electronic keys of Key2Share are similar to passports




 Issued by a central authority    Government        Enterprise
 Issued for a particular entity     Citizen          Employee
 Public (not a secret)                Yes         Yes (encrypted)
 Has binding to an identity of                   Cryptographic key
                                    Photo
 an entity it is issued for                    bound to the platform



                                                                       14
Key2Share Security
Platform Security     Secure communication
                      protocols




                                             15
Protocol Security

Well-established cryptographic
primitives (AES, SHA-1, RSA)

Formal security proof of the
protocols

Formal tool-aided verification of
protocols



                                    16
Platform Security
   Different trade-offs between security and requirements
    to a mobile device

        Less secure                                            More secure



   Built-in Security         System level software-based     Hardware-based
Mechanisms of Mobile OS           security extensions       security extensions

  No extra requirements to     Requires update of system   Requires support in
  mobile hardware and          software (e.g., OS)         hardware. Available
  system software (e.g.,                                   only on some
  operating system)                                        mobile platforms




                                                                                  17
Platform Security
Software-based security       Hardware-based security
extensions                    extensions




 provided by BizzTrust       Require support in hardware
  architecture                e.g., Giesecke & Devrient Mobile
                               Security Card http://www.gd-
 http://www.bizztrust.de/     sfs.com/the-mobile-security-
                               card/
                              Can be attached to the device
                               via microSD card slot           18
Supported Platforms
 Android NFC-enabled platforms
  (e.g., Samsung Nexus S, Galaxy S3)




                                       19
Summary

Flexible access rights:
 policy-based
 easy delegation
 remote revocation
 managable
Current Work

Proof of Concept with Bosch Security Systems:
 Key2Share as Access Pass
 Key2Share as Building Block in Bosch‘s
  „Access-Control-as-a-Service“
 Compatibility with already deployed
 infrastructure (wireless readers, management
 software)
Thank you
alexandra.dmitrienko@sit.fraunhofer.de




                                         22

More Related Content

PDF
Crowdshare, Secure Resource Sharing in Mobile Crowds
PDF
SURVEY OF TRUST BASED BLUETOOTH AUTHENTICATION FOR MOBILE DEVICE
PDF
www.ijerd.com
PDF
Network security dotnet
PDF
Dotnet tiltle for 2012 c
PDF
PDF
IRJET- Improved Identity-based Anonymous Broadcast Encryption with Chosen Cip...
Crowdshare, Secure Resource Sharing in Mobile Crowds
SURVEY OF TRUST BASED BLUETOOTH AUTHENTICATION FOR MOBILE DEVICE
www.ijerd.com
Network security dotnet
Dotnet tiltle for 2012 c
IRJET- Improved Identity-based Anonymous Broadcast Encryption with Chosen Cip...

Similar to Key2 share moosecon (20)

PDF
Access Control in Enterprises with Key2Share
PDF
Connections Summit - Security & Blockchain Track
PDF
Droidcon2013 key2 share_dmitrienko_fraunhofer
PDF
ASFWS 2011 - Secure software development for mobile devices
PDF
Smart Cards & Devices Forum 2012 - Mobile ID usnadňuje život jak uživatelům, ...
PDF
Smart Cards & Devices Forum 2012 - Securing Cloud Computing
PDF
C0c0n 2011 mobile security presentation v1.2
PDF
Assurity seminar 24 jan
PDF
droidcon 2012: What's the Hack is NFC .., Hauke Meyn, NXP
PDF
SmartCard Forum 2010 - Secured Access for enterprise
PPTX
CTS 2012: Rogers & Mobile Payments
PDF
Over the Air 2011 Security Workshop
PDF
Secure it mobile_comms
PPTX
Webinar on Enterprise Security & android
PPTX
Securing online services by combining smart cards and web-based applications
PPTX
Securing hand held computing devices
PPSX
information highway
PPT
Mobile Apps Security
PDF
Entrust Physical & Logical Access Solutions
PDF
SmartCard Forum 2011 - Evolution of authentication market
Access Control in Enterprises with Key2Share
Connections Summit - Security & Blockchain Track
Droidcon2013 key2 share_dmitrienko_fraunhofer
ASFWS 2011 - Secure software development for mobile devices
Smart Cards & Devices Forum 2012 - Mobile ID usnadňuje život jak uživatelům, ...
Smart Cards & Devices Forum 2012 - Securing Cloud Computing
C0c0n 2011 mobile security presentation v1.2
Assurity seminar 24 jan
droidcon 2012: What's the Hack is NFC .., Hauke Meyn, NXP
SmartCard Forum 2010 - Secured Access for enterprise
CTS 2012: Rogers & Mobile Payments
Over the Air 2011 Security Workshop
Secure it mobile_comms
Webinar on Enterprise Security & android
Securing online services by combining smart cards and web-based applications
Securing hand held computing devices
information highway
Mobile Apps Security
Entrust Physical & Logical Access Solutions
SmartCard Forum 2011 - Evolution of authentication market
Ad

More from Heinrich Seeger (11)

PDF
Dennis hoppe droidcon_2014_slide_deck_screen
PDF
Hasan hosgel moosecon_2013_customers_choice fullsize
PDF
Moosecon rcs for developers
PDF
Mobile apps on the big screen
PDF
Push notification generaltalk
PDF
Backendasaservice apiomat
PDF
PDF
Push notification technicaltalk
PDF
Moosecon native apps_blackberry_10-optimized
PDF
Mooscon 2013 cebit - google integration in android apps (1)
PDF
Dev mobile apps ent it final
Dennis hoppe droidcon_2014_slide_deck_screen
Hasan hosgel moosecon_2013_customers_choice fullsize
Moosecon rcs for developers
Mobile apps on the big screen
Push notification generaltalk
Backendasaservice apiomat
Push notification technicaltalk
Moosecon native apps_blackberry_10-optimized
Mooscon 2013 cebit - google integration in android apps (1)
Dev mobile apps ent it final
Ad

Recently uploaded (20)

PDF
ENT215_Completing-a-large-scale-migration-and-modernization-with-AWS.pdf
PPTX
MicrosoftCybserSecurityReferenceArchitecture-April-2025.pptx
PDF
DASA ADMISSION 2024_FirstRound_FirstRank_LastRank.pdf
PDF
project resource management chapter-09.pdf
PPTX
OMC Textile Division Presentation 2021.pptx
PPT
Module 1.ppt Iot fundamentals and Architecture
PDF
A comparative study of natural language inference in Swahili using monolingua...
PDF
August Patch Tuesday
PDF
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
PDF
DP Operators-handbook-extract for the Mautical Institute
PDF
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
PDF
Web App vs Mobile App What Should You Build First.pdf
PDF
Getting started with AI Agents and Multi-Agent Systems
PDF
Hindi spoken digit analysis for native and non-native speakers
PDF
TrustArc Webinar - Click, Consent, Trust: Winning the Privacy Game
PDF
Developing a website for English-speaking practice to English as a foreign la...
PDF
Microsoft Solutions Partner Drive Digital Transformation with D365.pdf
PDF
WOOl fibre morphology and structure.pdf for textiles
PPTX
O2C Customer Invoices to Receipt V15A.pptx
PDF
Assigned Numbers - 2025 - Bluetooth® Document
ENT215_Completing-a-large-scale-migration-and-modernization-with-AWS.pdf
MicrosoftCybserSecurityReferenceArchitecture-April-2025.pptx
DASA ADMISSION 2024_FirstRound_FirstRank_LastRank.pdf
project resource management chapter-09.pdf
OMC Textile Division Presentation 2021.pptx
Module 1.ppt Iot fundamentals and Architecture
A comparative study of natural language inference in Swahili using monolingua...
August Patch Tuesday
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
DP Operators-handbook-extract for the Mautical Institute
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
Web App vs Mobile App What Should You Build First.pdf
Getting started with AI Agents and Multi-Agent Systems
Hindi spoken digit analysis for native and non-native speakers
TrustArc Webinar - Click, Consent, Trust: Winning the Privacy Game
Developing a website for English-speaking practice to English as a foreign la...
Microsoft Solutions Partner Drive Digital Transformation with D365.pdf
WOOl fibre morphology and structure.pdf for textiles
O2C Customer Invoices to Receipt V15A.pptx
Assigned Numbers - 2025 - Bluetooth® Document

Key2 share moosecon

  • 1. Key2Share: NFC-enabled Smartphone-based Access Control Alexandra Dmitrienko Cyberphysical Mobile Systems Security Group Fraunhofer SIT, Darmstadt In collaboration with TU Darmstadt, Center for Advanced Security Research in Darmstadt (CASED), Intel Collaborative Research Institute for Secure Computing (ICRI-SC) at TU-Darmstadt, Bosch Security Systems
  • 2. Near Field Communication (NFC) Applications + NFC = services in one touch mPayments mTicketing
  • 3. Why not Using a Smartphone as a Key? + NFC =
  • 4. Smartphone as a Door Key  Access control by enterprises to their facilities  Access control in private sector (houses, garages) 4
  • 5. Smartphone as a Door Key  Access to hotel rooms 5
  • 6. Smartphone as a Car Key/Immobilizer  Fleet management by enterprises  Car sharing with family members or friends 6
  • 7. Smartphone as a Car Key/Immobilizer  Car sharing by rental/car sharing companies 7
  • 8. Smartphone for Access to Storage Facilities  Access to safes in hotel rooms  Lockers in luggage storage at train stations/airports DHL packing stations 8
  • 9. Smartphone for Access to Storage Facilities  DHL packstations 9
  • 10. Smartphone for Access to Facilities  E.g., parking houses 10
  • 11. Usual Keys vs. SmartCards vs. Key2Share Usual Keys SmartCards Key2Share Distribution Requires physical Requires physical Remote access access Revocation Requires physical Remote Remote access or replacement of the lock Delegation Not possible Not possible Possible Context-aware Not possible Possible Possible access (e.g., time frame) 11
  • 12. Key2Share: System Architecture Issuer 1. Employ the employee/sell the car Users Key2Share 2. One-time registration web-service 3. Electronic key issued 5. Share key 4. User Authentication with the issued key 6. User Authentication with the shared key Resources Delegated users 12
  • 13. Key Sharing  The key to be shared is represented as a QR-code  Can be sent to the recipient per e-mail, MMS or scanned by a camera of another device
  • 14. QR Code: What’s Inside?  Electronic keys of Key2Share are similar to passports Issued by a central authority Government Enterprise Issued for a particular entity Citizen Employee Public (not a secret) Yes Yes (encrypted) Has binding to an identity of Cryptographic key Photo an entity it is issued for bound to the platform 14
  • 15. Key2Share Security Platform Security Secure communication protocols 15
  • 16. Protocol Security Well-established cryptographic primitives (AES, SHA-1, RSA) Formal security proof of the protocols Formal tool-aided verification of protocols 16
  • 17. Platform Security  Different trade-offs between security and requirements to a mobile device Less secure More secure Built-in Security System level software-based Hardware-based Mechanisms of Mobile OS security extensions security extensions No extra requirements to Requires update of system Requires support in mobile hardware and software (e.g., OS) hardware. Available system software (e.g., only on some operating system) mobile platforms 17
  • 18. Platform Security Software-based security Hardware-based security extensions extensions  provided by BizzTrust  Require support in hardware architecture  e.g., Giesecke & Devrient Mobile Security Card http://www.gd-  http://www.bizztrust.de/ sfs.com/the-mobile-security- card/  Can be attached to the device via microSD card slot 18
  • 19. Supported Platforms  Android NFC-enabled platforms (e.g., Samsung Nexus S, Galaxy S3) 19
  • 20. Summary Flexible access rights:  policy-based  easy delegation  remote revocation  managable
  • 21. Current Work Proof of Concept with Bosch Security Systems:  Key2Share as Access Pass  Key2Share as Building Block in Bosch‘s „Access-Control-as-a-Service“  Compatibility with already deployed infrastructure (wireless readers, management software)