Presentation is loading. Please wait.

Presentation is loading. Please wait.

<month year> <doc.: IEEE doc> January 2013

Similar presentations


Presentation on theme: "<month year> <doc.: IEEE doc> January 2013"— Presentation transcript:

1 <doc.: IEEE 802.15-doc>
<month year> <doc.: IEEE doc> January 2013 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: [Security model of TG6] Date Submitted: [ January 14th, 2013] Source: [Marco Hernandez, Huan-Bang Li, Igor Dotlić, Ryu Miura ] Company: [NICT] Address: [3-4 Hikarino-oka, Yokosuka, , Japan] Voice:[ ] Fax: [ ] [] Re: [In response to call for technical guidance document contributions TG8] Abstract: [ ] Purpose: [Material for discussion in TG] Notice: This document has been prepared to assist the IEEE P It is offered as a basis for discussion and is not binding on the contributing individual(s) or organization(s). The material in this document is subject to change in form and content after further study. The contributor(s) reserve(s) the right to add, amend or withdraw material contained herein. Release: The contributor acknowledges and accepts that this contribution becomes the property of IEEE and may be made publicly available by P Hernandez,Li,Dotlić,Miura (NICT) <author>, <company>

2 Proof of concept for TG8 security
January 2013 Proof of concept for TG8 security TG6 developed a strong and self-contained security model for body area networks. Something similar may be applicable for infrastructure-less PAC. Hernandez,Li,Dotlić,Miura (NICT)

3 TG6 security summary Master key generation
A self-contained, low-overhead, but strong security solution is provided: Master key generation Through master key (MK) pre-shared association, unauthenticated association, public key hidden association, password-authenticated association, and display-authenticated association Simple two-way handshake for MK pre-shared association; elliptic curve cryptography (ECC) based for key agreement Temporal key creation/distribution Pairwise temporal key (PTK) creation for unicast protection Group temporal key (GTK) distribution for multicast/broadcast protection Data authentication/encryption AES-128 CCM for data authentication/encryption. Counter with Cipher block chaining Message authentication code. Replay prevention Low security overhead


Download ppt "<month year> <doc.: IEEE doc> January 2013"

Similar presentations


Ads by Google