Secure Smart Objects: Issues and Research trends



Similar documents
Mobile Cloud Computing

NFC Test Challenges for Mobile Device Developers Presented by: Miguel Angel Guijarro

What is a Smart Card?

A Guide to EMV. Version 1.0 May Copyright 2011 EMVCo, LLC. All rights reserved.

RF-Enabled Applications and Technology: Comparing and Contrasting RFID and RF-Enabled Smart Cards

Smart Cards a(s) Safety Critical Systems

Using RFID Techniques for a Universal Identification Device

Training. MIFARE4Mobile. Public. MobileKnowledge April 2015

Smart Card Technology Capabilities

Mobile Office Security Requirements for the Mobile Office

Security & Chip Card ICs SLE 44R35S / Mifare

Chytré karty opět o rok dál...

NFC: Enabler for Innovative Mobility and Payment NFC: MOBILIDADE E MEIOS DE PAGAMENTO

Banking. Extending Value to Customers. KONA Banking product matrix. is leading the next generation of payment solutions.

Your Mobile Phone as a Ticket (NFC)

NFC. Technical Overview. Release r05

Contactless Smart Cards vs. EPC Gen 2 RFID Tags: Frequently Asked Questions. July, Developed by: Smart Card Alliance Identity Council

3GPP TSG SA WG3 Security S3#30 S October 2003 Povoa de Varzim, Portugal. Abstract

Java Card. Smartcards. Demos. . p.1/30

Frequently Asked Questions

Bringing MNOs an end to end Mobile Connect Solution. Mobile Connect for Mobile Network Operator

Trusted Platforms for Homeland Security

Loyalty Systems over Near Field Communication (NFC)

advant advanced contactless smart card system

Theory and Practice. IT-Security: GSM Location System Syslog XP 3.7. Mobile Communication. December 18, GSM Location System Syslog XP 3.

Significance of Tokenization in Promoting Cloud Based Secure Elements

Mobile and Contactless Payment Security

Mobile MasterCard PayPass Testing and Approval Guide. December Version 2.0

Using an NFC-equipped mobile phone as a token in physical access control

Smart Card Evolution

Introducing etoken. What is etoken?

Training MIFARE SDK. Public. MobileKnowledge June 2015

Information Security Group (ISG) Core Research Areas. The ISG Smart Card Centre. From Smart Cards to NFC Smart Phone Security

Android pay. Frequently asked questions

Gemalto Mifare 1K Datasheet

RFID Penetration Tests when the truth is stranger than fiction

Microsoft Identity Lifecycle Manager & Gemalto.NET Solutions. Jan 23 rd, 2007

Smartcard Web Server Enabler Architecture

T-BOXN12R. First steps with T-BOXN12R. You can make it wireless. Date: Version 1.0

Embedded Java & Secure Element for high security in IoT systems

Common requirements and recommendations on interoperable media and multi-application management

The mobile phone as a contactless ticket

How To Protect A Smart Card From Being Hacked

How To Secure A Paypass Card From Being Hacked By A Hacker

Java Card TM Open Platform for Smart Cards

Smart Card. Smart Card applications

Secure My-d TM and Mifare TM RFID reader system by using a security access module Erich Englbrecht (info@eonline.de) V0.1draft

NFC Testing. Near Field Communication Research Lab Hagenberg. Gerald Madlmayr. NFC Research Lab, Hagenberg. E-Smart 2008, Sophia Antipolis

Side Channel Analysis and Embedded Systems Impact and Countermeasures

OBID RFID by FEIG ELECTRONIC. OBID classic / OBID classic-pro. RFID Reader Technology for Security Applications

Hacking the NFC credit cards for fun and debit ;) Renaud Lifchitz BT Hackito Ergo Sum 2012 April 12,13,14 Paris, France

Study of Java Card and its Application 1 Nainesh Rawani, 2 Akhil Patel

1. Fault Attacks for Virtual Machines in Embedded Platforms. Supervisor: Dr Konstantinos Markantonakis,

Supporting Smart Cards in UEFI

The OpenEapSmartcard platform. Pr Pascal Urien ENST Paris

Radio Frequency Identification (RFID)

How To Understand And Understand The Mobile Nfc Ecosystem

NFC Mobile Handset High Level Requirements V2

EMV-TT. Now available on Android. White Paper by

A Perspective on the Evolution of Mobile Platform Security Architectures

Business through Mobile Phone initiated Near Field Communication

NFC Hacking: The Easy Way

NACCU Migrating to Contactless:

a leap ahead in analog

Threat Modeling for offline NFC Payments

BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: Security Note

Using ISO Compliant RFID Tags in an Inventory Control System

THE APPEAL FOR CONTACTLESS PAYMENT 3 AVAILABLE CONTACTLESS TECHNOLOGIES 3 USING ISO BASED TECHNOLOGY FOR PAYMENT 4

Relations entre XLIM Université de Limoges et ISG-SCC Royal Holloway, University of London

GSM and UMTS security

Overview of Contactless Payment Cards. Peter Fillmore. July 20, 2015

Java Card Protection Profile Open Configuration

NFC Application Mobile Payments

Secure Automatic Ticketing System

Secure Authentication for the Development of Mobile Internet Services Critical Considerations

How Secure is Authentication?

RFID based Bill Generation and Payment through Mobile

Mobile NFC 101. Presenter: Nick von Dadelszen Date: 31st August 2012 Company: Lateral Security (IT) Services Limited

Mobile Electronic Payments

GlobalPlatform. Card Specification. Version 2.2

Risks of Offline Verify PIN on Contactless Cards

Technical Article. NFiC: a new, economical way to make a device NFC-compliant. Prashant Dekate

The Future is Contactless

Smart Card- An Alternative to Password Authentication By Ahmad Ismadi Yazid B. Sukaimi

Chip Card & Security ICs Mifare NRG SLE 66R35

Vulnerability Analysis and Attacks on NFC enabled Mobile Phones

A Guide to EMV Version 1.0 May 2011

Mobile Device Management

EMV: A to Z (Terms and Definitions)

An Open Source eid Simulator Open Identity Summit 9th -11th September 2013

Global Identity Management of Virtual Machines Based on Remote Secure Elements

Bank. CA$H 2.0 Contactless payment cards

Achieving Universal Secure Identity Verification with Convenience and Personal Privacy A PRIVARIS BUSINESS WHITE PAPER

PUF Physical Unclonable Functions

Transcription:

Secure Smart Objects: Issues and Research trends Samia Bouzefrane SEMpIA team CEDRIC Lab March 19th, 2013 samia.bouzefrane@cnam.fr 1

Agenda What is SSO? Characteristics of the platforms Security issues Actions to promote SSO domain samia.bouzefrane@cnam.fr 2

Context samia.bouzefrane@cnam.fr 3

Secure Devices Smart cards exist since 1979/1980 Research work for 30 years Evolution from contact to contactless devices New technologies : wireless networks, RFID Needs in terms of Security leading to trust systems samia.bouzefrane@cnam.fr 4

Characteristics Light-weight resources Memory Computation Energy Strong security constraints samia.bouzefrane@cnam.fr 5

Properties Communicating Objects Interaction with remote resources Secure Objects Secure interaction with the environment Interface Objects To access services Trust Objects The user trusts these objects Domestic Objects Human-CenteredDesign samia.bouzefrane@cnam.fr 6

Hard/Soft Platforms Smart cards (contact/contactless) Crypto-keys RFID sensors NFC chips TPM (Trusted Platform Module) TEE (Trusted Execution Environment) Mobile Trusted Modules for Mobile phones etc. samia.bouzefrane@cnam.fr 7

Research communities Smart Cards RFID/ Sensor Security and Privacy Trusted computing Internet of things samia.bouzefrane@cnam.fr 8

Smart cards as secure devices samia.bouzefrane@cnam.fr 9

According to eurosmart Source Eurosmart: http://www.eurosmart.com/index.php/publications/market-overview.html samia.bouzefrane@cnam.fr 10

Evolution of smart cards Inventor: Roland Moreno (1974-1979), 47 patents in 11 countries Involvement of industrials like Bull and Schlumberger Used in many domains: transport, telecom, banking, check access, passport From mono-application to multi-application From proprietary OS to open OS (Java Card,.NET) samia.bouzefrane@cnam.fr 11

ISO7816 Standard The standard ISO 7816-1 defines the physical characteristics of the card The standard ISO 7816-2 defines theposition ofthecontacts within the card The standard ISO 7816-3 defines theelectricsignalsusedto communicate with the card The standard ISO 7816-4 defines the basic commands to interact with the smart cards samia.bouzefrane@cnam.fr 12

Card Contacts in ISO7816-2 APDU protocol for communication samia.bouzefrane@cnam.fr 13

Card life cycle samia.bouzefrane@cnam.fr 14

Physical characteristics Monolithic component : CPU (8, 16, 32 bits) PROM (32 to 64 KB) containsos (JVM) RAM (1 to 4 KB) EEPROM/Flash 1KB to 128 KB (256 KB for Java Card) contains data and applications I/O interface crypto processor samia.bouzefrane@cnam.fr 15

Physical security Sensors to detect: a loss of electrical power, overheating of the components, light sensor. samia.bouzefrane@cnam.fr 16

A safety box Stores security keys and sensitive data Implements cryptographic algorithms Crypto-processor Used for authentication and encryption SIM card authentication with the cell networks Banking card authentication with payment terminals samia.bouzefrane@cnam.fr 17

Security protocols samia.bouzefrane@cnam.fr 18

Standards ISO 7816 (basic standard) ETSI (for SIM/USIM cards) EMV (Europay Mastercard Visa, for banking cards) ICAO (International Civil Aviation Organization, ONU agency, for biometry, passport) Health samia.bouzefrane@cnam.fr 19

SIM card Authentication with GSM SIM card Mobile Base Station VLR HLR/AuC LAI, TMSI Identity request IMSI Authentication request RAND Triplet(RAND, SRES, Kc) Kc=A8(Ki,RAND) SRES =A3(Ki,RAND) Aknowledgment A5(Kc, TMSI) SRES =SRES? Switch to encrypted mode Aknowledgment ETSI Standard samia.bouzefrane@cnam.fr 20

SIM card architecture samia.bouzefrane@cnam.fr 21

SIM card services Data Storage For network configuration (IMSI, lang. pref. ) For the user (agenda, SMS file, MSISDN) Dynamic information: session key (Kc), geolocalization (LAI, TMSI) Service Storage Applications Remote updates Proactive behaviour samia.bouzefrane@cnam.fr 22

APDU communication Mobile SIM samia.bouzefrane@cnam.fr 23

Pro-active mode Mobile SIM samia.bouzefrane@cnam.fr 24

Post-issuance Post-personalization = post-issuance samia.bouzefrane@cnam.fr 25

Over The Air management 3GPP TS 23.048 Standard (ETSI) SMS of type SIM Data Download Security mechanisms Authentication: DES signature (Hash message) added to the message Confidentiality: DES encryption of messages Integrity: add a checksum to the message Againtsreplay: add a seqno for each message samia.bouzefrane@cnam.fr 26

EMV payment Personalization with DDA Bank AuC Infos (C priv, C pub ) Sig Epriv (C pub ) (E pub, E priv ) Sig CApriv (E pub ) Certificat (C cert ) Certificat (E cert ) Banking card (Infos, C priv, C pub, C cert, E pub, E cert ) Transactions CA pub samia.bouzefrane@cnam.fr 27 Merchant

Dynamic Data Authentication C cert = Sig Epriv (C pub ) E cert = Sig CApriv (E pub ) (Infos, C cert, E cert ) T alea (Infos, C cert, E cert ) (Infos,C pub, C priv, C cert, E pub, E cert ) PIN code Res=Sig Cpriv (C alea, T alea ), C alea RSA(E cert, CA pub )=E pub CA pub RSA(C cert, E pub )=C pub Decrypt(Res, C pub )?= C alea, T alea Askto PIN code Banking card Crypt Cpub (PIN code, alea1, alea2) Merchant samia.bouzefrane@cnam.fr 28

Personalisationfor payment Bank Infos E master C master Card C master samia.bouzefrane@cnam.fr 29

Off line payment Derivation of a unique key for each transaction: C master ATC C trans 3DES(Trans, C trans, ATC) Card Merchant samia.bouzefrane@cnam.fr 30

On line payment C master C trans ARQC C trans (Trans, ARPC) ARPC Card Merchant Bank samia.bouzefrane@cnam.fr 31

Trusted Execution Environment samia.bouzefrane@cnam.fr 32

Industrydevelopment The pioneers (1975-1985): first foundation 1985-1995: the technology is improved Markets and large deployments: CB, GSM Limits: need more flexibility 1995-2005 : explosion of the market, cards based on Scalable Java Card 2013: 90% SIM cards are Java Card platforms With5 billions in 2012 2005-???: the card becomes an element of the network SCWS (Smart CardWeb Server),.Net, Java Card3.0 samia.bouzefrane@cnam.fr 33

Java Card technology samia.bouzefrane@cnam.fr 34

Java Card Specification Java Card 3 Specification by Oracle Classic edition (extension of Java Card 2.2) Java Card API Specification Java Card Runtime Environment Specification Java Card Virtual Machine Specification Connected edition (Web oriented, not deployed) Java Card forum promotes Java Card Tech. Global Platform defines a trust environment in a multi-application cards (as for Java Card) samia.bouzefrane@cnam.fr 35

Java Card platform samia.bouzefrane@cnam.fr 36

Development process Off-Card CAP file On-Card samia.bouzefrane@cnam.fr 37

Global Platform standard CAP file signed before conversion Checks the integrity of the installed applications Checks if the CAP file is signed Secure communication from the terminal Package authentication before applet installing Secure channels samia.bouzefrane@cnam.fr 38

GlobalPlatformCardSpecification v2.2.1 Controlling Authorities' Security Domain(s) Global Services Application(s) Application Providers' Security Domain(s) Issuer's Security Domain Application Provider Application(s) Card Issuer Application(s) GP API RTE API OPEN and GP Trusted Framework Runtime Environment samia.bouzefrane@cnam.fr 39

GP RunTimeEnvironment RTE dedicated to multi-applications card Provides to the applications A secure execution environment The code/data of applications are isolated from each other In Java Card, this is achieved thanks to the firewall applet samia.bouzefrane@cnam.fr 40

Security domains in Java Card In Java Card platforms Each application (package) in a Security Domain Many applications from distinct providers may co-exist in the same card A firewall applet checks the isolation Each application has its own trusted execution environment The applications may share objects samia.bouzefrane@cnam.fr 41

Attacks samia.bouzefrane@cnam.fr 42

Motivation Objective Find/modify confidential information Benefits Make a financial order, impersonation, invasion of privacy samia.bouzefrane@cnam.fr 43

Physical attacks Inspection of the circuit using the microscope (examples of results http://www.flylogic.net/) Observation Measure the response time of a query, measure the current consumption or electromagnetic circuit Micro-probing (to examine the data exchange of a bus) Disruption Change the clock rate (which is external) Vary the voltage Generate a strong magnetic field Light the silicon using a laser or a camera samia.bouzefrane@cnam.fr 44

Logical attacks Attacks taking advantage of bugs in the implementation of the JCVM. Weakness in the bytecode verifier Injection of code Laser attack to modify data values samia.bouzefrane@cnam.fr 45

Towards the contactless samia.bouzefrane@cnam.fr 46

RFID Radio Frequency Identification Identification of persons, objects, services Contactless technology: transmission by radio samia.bouzefrane@cnam.fr 47

RFID components RFID architecture: -base station: a reader, aterminal, cell phone, etc. that identifies and processes the information read by radio waves A transponder or "tag" : electronic label, contactless card. A system: web service, information systems, middleware processes the data for analysis, archiving, traceability. samia.bouzefrane@cnam.fr 48

RFID system architecture Radio Signal LAN, Web tag UID reader data samia.bouzefrane@cnam.fr 49

Tag components samia.bouzefrane@cnam.fr 50

RFID Tags/Frequencies Tags Memory/Microprocessortags Passive/Active Frequencies LowfrequencyLF (<= 135KHz) High frequencey HF (around 13.56 MHz) Ultra-highfrequencyUHF (~ 434 MHz, 869-915 MHz, 2.45 GHz) Micro-waves(~ 2.45 GHz) samia.bouzefrane@cnam.fr 51

ISO 14443 standards ISO 14443 (Part 1 to 4) Part 1 : contacless integrated circuit cards: physical characteristics Part 2: contacless integrated circuit cards: radio frequency power and signal inteface Part 3: contacless integrated circuit cards: initialization and anticollision Part 4: contacless integrated circuit cards: transmission protocol ISO 14443 Standards for contactless Distance : 10 cm rate: some hundreds of kilobits/s samia.bouzefrane@cnam.fr 52

ISO 10536 Standards ISO 10536 (1 to 4) : contaclessintegratedcircuit cards Part 1: Physical characteristics Part 2: Dimension and location of coupling areas Part 3: Electronic signals and reset procedures Part 4: Answer to reset and transmission protocols. ISO 10536 Distance : 10 mm samia.bouzefrane@cnam.fr 53

ISO 15693 Standards ISO 15693 (1 to 3) : contaclessintegratedcircuit cards Part 1 : vicinity cards: physical characteristics Part 2: vicinity cards: air interface and initialization Part 3: vicinitycards: anti-collision andtransmission protocol ISO 15693 Distance : 1m samia.bouzefrane@cnam.fr 54

Electronic passport According to ICAO DOC 9303 standard The electronic passport is a passive tag compatible with ISO/IEC 14443 standard has a cryptoprocessor(rsa-1024, elliptic curves) EEPROM: 30KB to 70KB samia.bouzefrane@cnam.fr 55

Security problems Basic tags used for identification with no authentication Resolvedon theserver: as in EPCglobal Centralizedsolution: implementationofcryptographicalsolutions for tags with resource capabilities(like smart cards) Privacy - Ex: biometric passeport includes an authentication mechanism (faraday cup) Geo-localization of objects Standardization in the field: too many different solutions Respect of the environnement: Biodegradable tags samia.bouzefrane@cnam.fr 56

NearField Communication samia.bouzefrane@cnam.fr 57

NFC over the world Japan with Sony FeliCa, NTT DoCoMo Cingular Wireless, Citigroup, New York subway, MasterCard Worldwide, Nokia, Venyon StoLPaN «Store Logistics and Payment with NFC» is a european consortium : http://www.stolpan.com Touch&Travel: Vodafone, Deutsche Bahn, Motorola, Giesecke&Devrient, ATRON electronic, Germany Manchester City Football Club, Orange, Barclays, TfL Oyster card Transportation in London, smart poster Cityzi at Nice, mobile payment at Caen and Strasbourg. samia.bouzefrane@cnam.fr 58

NFC modes samia.bouzefrane@cnam.fr 59

NFC Forum specifications/1 NFC Forum gathersa greatnumberofindustry: Samsung, Sony, Nokia, Nec, Panasonic, Visa Goal of standardization of RFID market like EPCglobal Modular architecture and interoperable targets the mobile market. Frequency 13.56MHz (HF) Rate of424 Kb/s Standardizedby ISO 18092 ISO 21481 l ECMA (European Computer Manufacturer Association) ECMA 340 NFC IP-1 ECMA 352 NFC IP-2+ Compatible ISO 14443-A, Felica(Sony), Mifare(Philips) samia.bouzefrane@cnam.fr 60

NFC Forum specifications/2 NFC allows a phone to read / write a tag, to act as a smart card or to communicate with another phone. 3 modes : Read/write of tags (MIFARE ) Peerto peer(initiator& target) Card emulation Distance : 0-20 cm Rate: 424 kbits/s NFC Forum : NDEF specs samia.bouzefrane@cnam.fr 61

Other standards / SCP (Smart Card Platform) to specify the interface between the SIM card and the chip NFC. to specify the multiapplication architecture of the secure element. for the impact on the EMV payment applications. samia.bouzefrane@cnam.fr 62

NFC Forum specifications Peer to peer mode Read/Write mode Card emulation mode Applications LLCP (Logical Link Control Protocol) RTD (Record Type Definition) & NDEF (Data Exchange Format) Card Emulation (Smart Card Capability for Mobile Devices) RF Layer ISO 18092 + ISO 14443 Type A, Type B + FeliCa samia.bouzefrane@cnam.fr 63

Mobile Payment Applications Java Blackberry OTA Single WireProtocol(SWP) : thesim cardislinked to thesecureelement(se) building a samejava Card. GlobalPlatform is used for isolation & security. OS CPU UICC SIM Apps OS NFC Chip NFC antenna External env. samia.bouzefrane@cnam.fr 64

Threats Denial of service by using a jammer to disrupt the communications Identity Theft: Solution: use a challenge-response protocol instead of a simple identification protocol Data recovery: data leakage, traceability, etc. Relay attacks: Solution distance bounding protocol that evaluates the distance by measuring the time elapsed samia.bouzefrane@cnam.fr 65

Trusted Platform Module samia.bouzefrane@cnam.fr 66

Trusted Platform Module Manufacturers: HP, Infineon, Intel Dell, FUJITSU, etc. Sensors: Over/Under voltage detection, low frequency sensor, high frequency filter, reset filter More than500 millions ofpcswithtpms http://trusted-computing.wikispaces.com/ M+-+TPM+Chip+can+be+turned+off+Entirely samia.bouzefrane@cnam.fr 67

Trusted Computing Group Called Trusted Computing Platform Alliance until 2003 Consortium of companies: Compaq, HP, IBM, Intel, Microsoft, AMD, etc. Designed a specification for computing platforms that creates a foundation of trust for software processes, based on a small amount of hardware within such platforms. The cheapest way to enhance security in an ordinary, nonsecure computing platform. PCs, servers, personal digital assistant (PDA), printer, or mobile phone can be converted to Trusted Platforms. samia.bouzefrane@cnam.fr 68

First trusted platforms : PCs to store secret keys to encrypt data files/messages, to sign data, etc. implement mechanisms and protocols to ensure that a platform has loaded its software properly. Have their own hardware and are independent from the operating system of the PC. samia.bouzefrane@cnam.fr 69

TPMsof Microsoft for PCs, Tablets Encryption of data files: Windows EFS (Encrypting File System), Virtual Encrypted Drive (Personal Secure Drive) Electronic mails withoutlook, Outlook Express that take into account digital signature, encryption/decryption of emails. VPN (Virtual Private Network), client authentication samia.bouzefrane@cnam.fr 70

Benefits Existing applications may benefit from enhanced security of the platforms Development of new applications that require higher security levels New applications: electronic cash, email, single sign-on, virtual private networks, Web access, and digital content delivery. samia.bouzefrane@cnam.fr 71

Trusted Platform Subsystem TPM: chip CRTM: boot process TSS: services for the platform and others http://www.hpl.hp.com/techreports/2002/hpl-2002-221.pdf samia.bouzefrane@cnam.fr 72

Attestation Identity to prove TP authenticity Identity created by the TP Identity Attestation from the CA http://www.hpl.hp.com/techreports/2002/hpl-2002-221.pdf samia.bouzefrane@cnam.fr 73

TPM protected objects http://www.hpl.hp.com/techreports/2002/hpl-2002-221.pdf samia.bouzefrane@cnam.fr 74

Trusted Platform Module "TPM chip" or "TPM Security Device" http://en.wikipedia.org/wiki/trusted_platform_module samia.bouzefrane@cnam.fr 75

Issues Privacy issue: security is delegated to the TPM, the user has no control on his data Each object is signed (what about the free software?) The TPM is a trust root that needs to interact with trust Cloud if any. samia.bouzefrane@cnam.fr 76

Mobile Trusted Module Mobile Phone Work Group has proposed a MTM Generally not implemented in mobile platforms Software trusted domains are proposed As security domains of Global Platform Attestation techniques to verify the integrity of the mobile samia.bouzefrane@cnam.fr 77

Our activities What is a Cloud of trust? How to define a trust mobile using a piece of software and the SIM card instead of MTM? How to build a trust environment including mobile platforms and a cloud (mobicloud computing)? How to manage privayin this context? samia.bouzefrane@cnam.fr 78

References ETSI Standard: http://www.etsi.org/ EMV Standard: http://www.emvco.com/ Trusted Computing Platforms, the Next Security Solution, http://www.hpl.hp.com/techreports/2002/hpl-2002-221.pdf Lecture notes of SamiaBouzefrane http://cedric.cnam.fr/~bouzefra/ NFC forum: http://www.nfc-forum.org/home/ Java Card forum: http://www.javacardforum.org/ Global Platform: http://www.globalplatform.org/ Oracle: www.oracle.com/ TCG: http://www.trustedcomputinggroup.org/ samia.bouzefrane@cnam.fr 79

Actions to promote SSO samia.bouzefrane@cnam.fr 80

CommunautéSSO Àl échelle nationale: créer une action CNRS A l échelle internationale: Un workshop international co-localiséavec IEEE ithings 2013 samia.bouzefrane@cnam.fr 81

Action CNRS SSO samia.bouzefrane@cnam.fr 82

GDR ASR 2013-2016 PôleArchitectures Embarquées dirigépar Claire Pagetti(ONERA) et Pierre Boulet(Université de Lille 1, LIFL) PôleSystèmes dirigépar Jean-Marc Menaud(Ecoledes Mines de Nantes) et Jean-Louis Pazat(IRISA) PôleRéseauxde Communication dirigépar Eric Fleury(ENS Lyon) et André-Luc Beylot(IRIT/ENSEEIHT) Action Cloud Computing dirigée par Pierre Sens(LIP6) et Samir Tata(Institut Mines Telecom) Action Secure Smart Objects dirigéepar SamiaBouzefrane (CNAM) et MarylineLaurent (InstitutMines Telecom) samia.bouzefrane@cnam.fr 83

Action CNRS SSO Objectifs regrouper la communautéfrançaise travaillant sur cette thématique renforcer et faire connaître ses activités organiser des événements scientifiques comme des Conférences, des Écoles d été, etc. impliquer les entreprises samia.bouzefrane@cnam.fr 84

JournéeNFC/SSO le 29 Mars Lien: http://www.sigops-france.fr/main/journee-nfc-sso Organisateurs: S. Bouzefrane & P. Paradinas(CNAM) M. Laurent (Télécom SudParis) P. Métivier(Forum des Services mobiles sans contact) Programme Matindédiéau NFC: 4 intervenants(forum dusans contact, Inside Secure, Orange Labs, Visa Europe) Après-midi dédié au SSO: Présentations par les entreprises et les universités samia.bouzefrane@cnam.fr 85

International Workshop on SSO samia.bouzefrane@cnam.fr 86

International Workshop SSO Lien: http://www.china-iot.net/workshops/sso.htm Workshop international sursso Associé à la Conférence IEEE ithings 19-23 Août2013 àbeijing Organisateurs: S. Bouzefrane (CNAM), Jean-Louis Lanet(univ. Limoges), M. Laurent (Telecom SudParis), Li Li (Wuhan univ.) samia.bouzefrane@cnam.fr 87

TraitésHermès samia.bouzefrane@cnam.fr 88

TraitéHermès Carte àpuce Initiéet coordonnépar S. Bouzefrane & P. Paradinas Dédiéàla carte àpuce 12 chapitres 24 participants Parutionen Avril2013 samia.bouzefrane@cnam.fr 89

TraitéHermès gestiond identités numériques Initiéet coordonnépar S. Bouzefrane & M. Laurent Différents aspects de la gestion d identités Ouverture vers le Cloud computing Parutionen fin 2013 samia.bouzefrane@cnam.fr 90

Thank you gfrdsdrfg samia.bouzefrane@cnam.fr 91