4 changed files with 110 additions and 0 deletions
Binary file not shown.
@ -0,0 +1,110 @@ |
|||
\documentclass[12pt]{article} |
|||
|
|||
\usepackage[utf8]{inputenc} |
|||
\usepackage[english]{babel} |
|||
\usepackage[paper=a4paper, left=25mm, right=25mm, top=25mm, bottom=22mm]{geometry} |
|||
\usepackage[T1]{fontenc} |
|||
\usepackage{lmodern} |
|||
\usepackage{listings} |
|||
\usepackage{fancyhdr} |
|||
\usepackage{verbatim} |
|||
\usepackage{graphicx} |
|||
\usepackage{amsmath} |
|||
\usepackage{dsfont} |
|||
\usepackage{eurosym} |
|||
|
|||
\DeclareUnicodeCharacter{20AC}{\euro} |
|||
|
|||
\clubpenalty = 10000 |
|||
\widowpenalty = 10000 |
|||
\displaywidowpenalty = 10000 |
|||
|
|||
\pagestyle{fancy} |
|||
\setlength{\parskip}{1ex} |
|||
\fancyhf{} |
|||
\fancyfoot[L]{\scriptsize{Proposal Master Thesis, |
|||
Michael Preisach}} |
|||
\fancyfoot[R]{\scriptsize{Page \thepage}} |
|||
\renewcommand{\headrulewidth}{0pt} |
|||
\renewcommand{\footrulewidth}{0.5pt} |
|||
\setcounter{secnumdepth}{2} |
|||
\setcounter{section}{0} |
|||
\lstset{ |
|||
language=VHDL, |
|||
columns=fixed, |
|||
tabsize=7, |
|||
basicstyle=\footnotesize \ttfamily, |
|||
keywordstyle=\slshape \bfseries, |
|||
showstringspaces=false, |
|||
} |
|||
\setlength{\parindent}{0cm} |
|||
\title{Digidow's Biometric Sensor\\\normalsize{Proposal for Master Thesis}} |
|||
\author{Michael Preisach, BSc} |
|||
\date{December 2018} |
|||
|
|||
\fancypagestyle{plain} |
|||
{ |
|||
\fancyfoot[L]{\scriptsize{Proposal Master Thesis, |
|||
Michael Preisach}} |
|||
\fancyfoot[R]{\scriptsize{Page \thepage}} |
|||
\renewcommand{\headrulewidth}{0pt} |
|||
\renewcommand{\footrulewidth}{0.5pt} |
|||
} |
|||
\begin{document} |
|||
\maketitle |
|||
\section{Motivation} |
|||
Digidow is a research project of Prof. Mayrhofer, head of the Institute for Networks and Security (INS). |
|||
The project is aims to be a secure and privacy-friendly solution to identify or authenticate a person to a requester. |
|||
Figure \ref{fig:digidow} shows a graphical overview of the planned identification process in this project. |
|||
|
|||
\begin{figure}[h] |
|||
\centering |
|||
\includegraphics[width=\textwidth]{../resources/globalview} |
|||
\caption{Overview of the Digidow Project} |
|||
\label{fig:digidow} |
|||
\end{figure} |
|||
|
|||
After service discovery (1) over a distributed network, a user should be able to be identified by that system. |
|||
When a person intends to get access by this system, she initially should provide a unique ID (2). |
|||
Given this information, the \emph{Verifier} asks the \emph{Biometric Sensor} to gain biometric data of this person(3). |
|||
In fact, one can use any form of data which uniquely identifies a single person. |
|||
Once, this data is retrieved, the Biometric Sensor finds the user's \emph{Personal Agent}, builds trust (4, 6) in between and submits the data subsequently(5). |
|||
Since the Personal Agent holds all required data to identify its corresponding user, it is able to decide whether the claim is correct or not (7). |
|||
Based on that decision, the Verifier can then trigger an adequate reaction(8). |
|||
This system is designed to implement the \emph{Need-To-Know} principle and thus privacy for the user. |
|||
|
|||
\section{Scope of the Thesis} |
|||
This master thesis will cover a major part of the \emph{Biometric Sensor}. |
|||
When a request of the \emph{verifier} appears, the system captures data from the biometric interface, wraps and submits it to the \emph{personal agent}, where further processing is done. |
|||
Two essential questions arise while doing so. |
|||
First, the system has to identify the corresponding personal agent. |
|||
This problem should be solved with the service discovery part. |
|||
Second and more important for this thesis is the question, how the sensor system and the personal agent trusts each other. |
|||
Therefore one is able to generate trust via a \emph{Trusted Platform Module} (TPM). |
|||
Another question is how the system interacts with attached sensors that get the sensible data. |
|||
|
|||
\subsection{Practical Part} |
|||
One goal of this thesis is to set up a system which is \emph{trustworthy}. |
|||
This means that the system's TPM can verify every major part of the executed software (firmware, boot loader, kernel, driver, executed software, firmware of attached devices, \ldots). |
|||
|
|||
Furthermore a program should read data from attached sensors. |
|||
This data should then be sent to the personal agent for further processing. |
|||
Before this can be done, both, Personal Agent and the Biometric Sensor have to trust each other. |
|||
The TPM provides a function called \emph{Direct Anonymous Attestation} to tackle this problem. |
|||
Since the TPM is a passive part in the system, these features have to be accessed with a custom program. |
|||
|
|||
After having this system implemented, a demonstration platform should illustrate how this system works. |
|||
The not yet provided, but required interfaces will be simulated in a way that allow to demonstrate the function of the implemented part of this thesis. |
|||
|
|||
\section{Discussion} |
|||
The implementation and demonstration allows then a discussion about benefits and drawbacks of the implementation and a comparison to other possible implementations. |
|||
This thesis should cover and discuss the following questions: |
|||
\begin{itemize} |
|||
\item What is trust? |
|||
\item How does the TPM benefit to the system's trust? |
|||
\item What are the limitations by using a TPM? |
|||
\item What is necessary to trust a system with a TPM? |
|||
\item How can trust be generated between Personal Agent and Biometric Sensor? |
|||
\end{itemize} |
|||
|
|||
\end{document} |
|||
Binary file not shown.
Binary file not shown.
Loading…
Reference in new issue