Advanced SIM Capabilities Supporting Trust-Based Applications

  • Thomas Vilarinho
  • Kjetil Haslum
  • Josef Noll
Part of the Lecture Notes in Computer Science book series (LNCS, volume 5838)


The SIM cards are going through several new enhancements both in the underlying hardware and its capabilities. They are becoming secure wireless networked devices containing embedded sensors. This paper assess how this new capabilities together with the pervasiveness and security of the SIM card can support the development and design of trust-based applications. Moreover, we present a specific use-case around a seamless trust builder for social networks, which makes use of sensed inputs towards building hard contextual evidences to trust relations. We conclude with the description of the challenges of building this evidence based trust-builder and the necessary steps to going from the prototype we developed to a real application which may accurately describe trust relations.


SIM cards trust networked embedded systems pervasive computing Sun SPOT social networks context-awareness 


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Breslin, J., Decker, S.: The future of social networks on the internet: The need for semantics. IEEE Internet Computing 11(6), 86–90 (2007)CrossRefGoogle Scholar
  2. 2.
    Beattie, R.: Linking out after two years of linked in (2005), (Last accessed: 31/05/09)
  3. 3.
    Ann Golbeck, J.: Computing and applying trust in web-based social networks. PhD thesis, University of Maryland, College Park (2005)Google Scholar
  4. 4.
    Renaudin, M., Bouesse, F., Proust, P., Tual, J.P., Sourgen, L., Germain, F.: High security smartcards. In: DATE 2004: Proceedings of the conference on Design, automation and test in Europe, p. 10228. IEEE Computer Society, Washington (2004)Google Scholar
  5. 5.
    Markantonakis, C., Mayes, K., Tunstall, M., Sauveron, D., Piper, F.: Smart card security. In: Nedjah, N., Abraham, A., de Macedo Mourelle, L. (eds.) Computational Intelligence in Information Assurance and Security. Studies in Computational Intelligence, vol. 57, pp. 201–233. Springer, Heidelberg (2007)CrossRefGoogle Scholar
  6. 6.
    GlobalPlatform Inc.: GlobalPlatform, Card Specification Version 2.2 (March 2006)Google Scholar
  7. 7.
    ETSI: ETSI TS 102 483: Smart cards; UICC-Terminal interface; Internet Protocol connectivity between UICC and terminal V8.1.0 (April 2009)Google Scholar
  8. 8.
    Eisl, F.: Smart card security services for an open application environment used in mobile phones (June 2004)Google Scholar
  9. 9.
    OMA: Smart Card Web Service Standard Version 1.1 (2009)Google Scholar
  10. 10.
    ETSI: ETSI TS 102 613: Smart Cards; UICC - Contactless Front-end (CLF) Interface; Part 1: Physical and data link layer characteristics V7.5.0 (April 2009)Google Scholar
  11. 11.
    ETSI: ETSI TS 102 622: Smart cards; Smart Cards; UICC - Contactless Front-end (CLF) Interface; Host Controller Interface (HCI) V7.4.0 (April 2009)Google Scholar
  12. 12. Oberthur technologies announces simsense - the first motion detection sim card (2009), (Last accessed: 31/05/09)
  13. 13.
    Cellular-news: Sagem to embed gps receiver into sim cards (2008), (Last accessed: 31/05/2009)
  14. 14.
    Brede, S.: ETSI Workshop presentation June 4-5, 2008 A couple of M2M activities: WLANSIM a wireless IP networked UICC. Telenor R & I (2008)Google Scholar
  15. 15.
    Turolla, M., Alessio, E.: Presentation ZSIM enabling innovative services to improve quality of life. Telecom Italia – Innovation & Engineering (2006)Google Scholar
  16. 16.
    3GPP: ETSI TR 133 980: Digital cellular telecommunications system (Phase 2+); Universal Mobile Telecommunications System (UMTS); Liberty Alliance and 3GPP security interworking; Interworking of Liberty Alliance Identity Federation Framework (ID-FF), Identity Web Services Framework (ID-WSF) and Generic Authentication Architecture (GAA) V7.6.0 (October 2007)Google Scholar
  17. 17.
    Sun Microsystems, Inc.: Runtime Environment Specification: Java (TM) Platform, Version 3.0, Connected Edition (March 2008)Google Scholar
  18. 18.
    Johannessen, T.: Identity management in general and with attention to mobile gsm-based systems. Telektronikk, 31–51 (2007)Google Scholar
  19. 19.
    GSM Association.: Identity Management Framework Document V1.1 (2008)Google Scholar
  20. 20.
    Stutzman, F.: An evaluation of identity-sharing behavior in social network communities. Journal of the International Digital Media and Arts Association (2006)Google Scholar
  21. 21.
    Fogel, J., Nehmad, E.: Internet social network communities: Risk taking, trust, and privacy concerns. Computers in Human Behavior 25(1), 153–160 (2009)CrossRefGoogle Scholar
  22. 22.
    Korpipää, P., Mäntyjärvi, J., Kela, J., Keränen, H., Malm, E.J.: Managing context information in mobile devices. IEEE Pervasive Computing 2(3), 42–51 (2003)CrossRefGoogle Scholar
  23. 23.
    Schmidt, A., Laerhoven, K.V.: How to build smart appliances. IEEE Personal Communications 8, 66–71 (2001)CrossRefGoogle Scholar
  24. 24.
    Hristova, A.: Conceptualization and design of a context-aware platform for user-centric applications (June 2008)Google Scholar
  25. 25.
    Mayes, K.E., Markantonakis, K.: On the potential of high density smart cards. Information Security Technical Report 11(3), 147–153 (2006)CrossRefGoogle Scholar
  26. 26.
    Katz, Y., Golbeck, J.: Using social network-based trust for default reasoning on the webGoogle Scholar
  27. 27.
    Taherian, M., Amini, M., Jalili, R.: Trust inference in web-based social networks using resistive networks. In: ICIW 2008: Proceedings of the 2008 Third International Conference on Internet and Web Applications and Services, pp. 233–238. IEEE Computer Society, Washington (2008)CrossRefGoogle Scholar
  28. 28.
    Bražinskas, R.: Towards context awareness using mobile sensors (2008)Google Scholar
  29. 29.
    Chang, E., Dillon, T., Hussain, F.: Trust and reputation for service-oriented environments: technologies for building business intelligence and consumer confidence. Wiley, Chichester (2006)CrossRefGoogle Scholar
  30. 30.
    Karantonis, D.M., Narayanan, M.R., Mathie, M., Lovell, N.H., Celler, B.G.: Implementation of a real-time human movement classifier using a triaxial accelerometer for ambulatory monitoring. IEEE Transactions on Information Technology in Biomedicine 10(1), 156–167 (2006)CrossRefGoogle Scholar
  31. 31.
    AlNemr, R., Meinel, C.: Getting more from reputation systems: A context-aware reputation framework based on trust centers and agent lists. In: International Multi-Conference on Computing in the Global Information Technology, pp. 137–142 (2008)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2009

Authors and Affiliations

  • Thomas Vilarinho
    • 1
  • Kjetil Haslum
    • 2
  • Josef Noll
    • 3
  1. 1.Department of Telematics at NTNU and Telenor R&I, TrondheimNorway
  2. 2.Telenor R&I, TrondheimNorway
  3. 3.University of Oslo/UNIK, KjellerNorway

Personalised recommendations