An Overview of GSMA's M2M Remote Provisioning Specification
Authors:
Maxime Meyer,
Elizabeth A. Quaglia,
Ben Smyth
Abstract:
M2M devices are ubiquitous, and there is a growing tendency to connect such devices to mobile networks. Network operators are investigating new solutions to lower their costs and to address usability issues. Embedded SIM cards with remote provisioning capability are one of the most promising solutions. GSMA, the leading consortium on mobile network standards, has proposed a specification for such…
▽ More
M2M devices are ubiquitous, and there is a growing tendency to connect such devices to mobile networks. Network operators are investigating new solutions to lower their costs and to address usability issues. Embedded SIM cards with remote provisioning capability are one of the most promising solutions. GSMA, the leading consortium on mobile network standards, has proposed a specification for such an embedded SIM card, called eUICC. The specification describes eUICC architecture and a remote provisioning mechanism. Embodiments of this specification have the potential to disrupt the telecommunications market: eUICCs will be shipped to device manufacturers and then remotely provisioned with a subscription, whereas (currently) SIMs must be provisioned prior to shipping. In this article, we present a comprehensive overview of GSMA's specification and its motivation. In particular, we describe the technology and the protocols involved in remote provisioning.
△ Less
Submitted 5 June, 2019;
originally announced June 2019.
A short introduction to secrecy and verifiability for elections
Authors:
Elizabeth A. Quaglia,
Ben Smyth
Abstract:
We explore the fundamental properties that are necessary to ensure that election schemes behave as expected. The exploration reveals how our understanding of those expectations has evolved, culminating in the emergence of formal definitions of properties necessary to fulfil expectations. We provide insights into definitions of secrecy and verifiability, allowing us to learn and appreciate the unde…
▽ More
We explore the fundamental properties that are necessary to ensure that election schemes behave as expected. The exploration reveals how our understanding of those expectations has evolved, culminating in the emergence of formal definitions of properties necessary to fulfil expectations. We provide insights into definitions of secrecy and verifiability, allowing us to learn and appreciate the underlying intuition and technical details of these notions.
Equipped with definitions, we can build election schemes that can be proven to behave as expected. And, as an illustrative example, we review a variant of the Helios election system that was built and proven secure, in this way. Furthermore, the definitions can be used to analyse existing election schemes, and vulnerabilities have been uncovered. Indeed, we describe a series of vulnerabilities that were discovered during the analysis of the original Helios system, which advanced our understanding of system behaviour and prompted the design of the aforementioned variant.
Thus, this article contributes to the science of security by sharing valuable insights into elections, and demonstrating the value that formal definitions and analysis have in building schemes guaranteed to behave as expected.
△ Less
Submitted 19 September, 2018; v1 submitted 10 February, 2017;
originally announced February 2017.