Channels ▼


EU's SEPIA Project for Mobile Security

It's been a long time since mobile phones were used solely as phones. Banking transactions are carried out, event tickets purchased, and music consumed — all on mobile phones. But the variety of applications also means increased security risks for users. To protect confidential data (and thus, safeguard privacy), the SEPIA (Secure, Embedded Platform with advanced process Isolation and Anonymity capabilities) EU project has been established.

More and more people are using mobile phones for an increasing number of purposes and the cell phone has become a personal electronic assistant for all occasions.

"People play games on the mobile, buy concert tickets, and use it as a key for access control. Data is stored at every step to allow activities to be assigned to particular phones and thus to specific people," said Kurt Dietrich of the Institute of Applied Information Processing and Communication Technology (IAIK) of Graz University of Technology in Austria.

It’s especially difficult to protect the privacy of individual persons. "When a person executes an access control using a mobile, it is enough to know that the person has permission to enter the building. More information about that person and his or her further activities are not required and should remain confidential," Dietrich added.

In the framework of SEPIA, Graz University of Technology researchers in cooperation with leading companies in the field (including Infineon, ARM, and brightsight) are aiming to increase security for future generations of mobile phones. "Confidential data protection is [the] number one priority at all development levels — from design to the finished product," Dietrich said. Focus of the research at IAIK is on anonymity-preserving processes. Furthermore, the researchers want to develop new security mechanisms for mobile phone processors of the future.

SEPIA will focus on three topics: Security enhancements of mobile platforms, cryptography, and privacy protecting technologies, as well as delta-evaluation and certification methodologies. A major objective of SEPIA is to define a next-generation security-architecture for mobile and embedded systems, addressing topics such as isolated execution space, virtualization, and secure protection of confidential data. Moreover, privacy protecting mechanisms, based on strong cryptography and time- and cost-efficient certification processes, reducing the time from design to market, will be researched in the project. In SEPIA, establishing trustworthiness is seen as an asset that is considered right from the design phase rather than being addressed as add-on feature. SEPIA will include theoretical and practical research as well as the development of proof-of-concept prototypes. All these efforts will result in the SEPIA reference platform which will be disseminated via demonstrators and as an open platform for further research and product development.

Related Reading

More Insights

Currently we allow the following HTML tags in comments:

Single tags

These tags can be used alone and don't need an ending tag.

<br> Defines a single line break

<hr> Defines a horizontal line

Matching tags

These require an ending tag - e.g. <i>italic text</i>

<a> Defines an anchor

<b> Defines bold text

<big> Defines big text

<blockquote> Defines a long quotation

<caption> Defines a table caption

<cite> Defines a citation

<code> Defines computer code text

<em> Defines emphasized text

<fieldset> Defines a border around elements in a form

<h1> This is heading 1

<h2> This is heading 2

<h3> This is heading 3

<h4> This is heading 4

<h5> This is heading 5

<h6> This is heading 6

<i> Defines italic text

<p> Defines a paragraph

<pre> Defines preformatted text

<q> Defines a short quotation

<samp> Defines sample computer code text

<small> Defines small text

<span> Defines a section in a document

<s> Defines strikethrough text

<strike> Defines strikethrough text

<strong> Defines strong text

<sub> Defines subscripted text

<sup> Defines superscripted text

<u> Defines underlined text

Dr. Dobb's encourages readers to engage in spirited, healthy debate, including taking us to task. However, Dr. Dobb's moderates all comments posted to our site, and reserves the right to modify or remove any content that it determines to be derogatory, offensive, inflammatory, vulgar, irrelevant/off-topic, racist or obvious marketing or spam. Dr. Dobb's further reserves the right to disable the profile of any commenter participating in said activities.

Disqus Tips To upload an avatar photo, first complete your Disqus profile. | View the list of supported HTML tags you can use to style comments. | Please read our commenting policy.