Presentation is loading. Please wait.

Presentation is loading. Please wait.

Submission 15-11-0364-00-0hip Slide 1 Project: IEEE P802.15 Working Group for Wireless Personal Area Networks (WPANs) Submission Title: [Bootstrapping.

Similar presentations


Presentation on theme: "Submission 15-11-0364-00-0hip Slide 1 Project: IEEE P802.15 Working Group for Wireless Personal Area Networks (WPANs) Submission Title: [Bootstrapping."— Presentation transcript:

1 Submission 15-11-0364-00-0hip Slide 1 Project: IEEE P802.15 Working Group for Wireless Personal Area Networks (WPANs) Submission Title: [Bootstrapping using HIP] Date Submitted: [11 May, 2011] Source: [Cao Zhen, Liu Dapeng] Company [China Mobile Communications Corporation] Address [28 Xuanwumenxi Ave. Beijing, China] Voice:[+86-66006688], FAX: [+86-10-63601087], E-Mail:[{caozhen,liudapeng}@chinamobile.com] Abstract:[This document discusses the method of using HIP and diet-HIP to bootstrap the IEEE 802.15.4 network ] Purpose:[For information and discussion] Notice:This document has been prepared to assist the IEEE P802.15. It is offered as a basis for discussion and is not binding on the contributing individual(s) or organization(s). The material in this document is subject to change in form and content after further study. The contributor(s) reserve(s) the right to add, amend or withdraw material contained herein. Release:The contributor acknowledges and accepts that this contribution becomes the property of IEEE and may be made publicly available by P802.15.

2 Submission 15-11-0364-00-0hip Slide 2 Bootstrapping WPAN using HIP Zhen Cao, Dapeng Liu April 25, 2011

3 Submission 15-11-0364-00-0hip The Problem IEEE standards ensure connectivitiy at MAC and Phy layer IETF standards achieve IP connectivity IEEE 802.15.4 MAC encodes encryption payload, but no way to initiate the keys How to initially configure the network? –How nodes authenticate to the network –How nodes get the IP address –… –In one word, how to bootstrap? Slide 3

4 Submission 15-11-0364-00-0hip What’s Bootstrapping Any process before the network can operate –Link-layer address –MAC layer configuration –Encryption/authentication keys Slide 4

5 Submission 15-11-0364-00-0hip System level requirements Data Confidentiality Data Integrity Keys and key freshness Multi domain support Identities Slide 5

6 Submission 15-11-0364-00-0hip Bootstrapping using HIP End-to-end bootstrapping –Using HIP to establish the SA between two end points –Using the HIP-established SA to delieve the management objects Slide 6 PAN Coordinator Bootstrapping and get the configuration objects Other network

7 Submission 15-11-0364-00-0hip What’s HIP Slide 7 7 IP layer Fragmentation Link Layer ForwardingForwarding IPsec Transport Layer End-to-end, HITs Hop-by-hop, IP addresses HIP MobilityMobility Multi-homingMulti-homing v4/v6 bridge

8 Submission 15-11-0364-00-0hip HIP Basic Exchange Initiator Responder I1: HIT I, HIT R or NULL R1: HIT I, [HIT R, puzzle, DH R, HI R ] sig I2: [HIT I, HIT R, solution, DH I, {HI I }] sig R2: [HIT I, HIT R, authenticator] sig User data messages Control Data

9 Submission 15-11-0364-00-0hip The problem with HIP HIP BEX (Basic Exchange) is heavy weight –Puzzle solutions –SA negotiation –IPsec Slide 9

10 Submission 15-11-0364-00-0hip Diet HIP Slide 10 The HIP DEX, rather than a BEX, exchange is identified by a DEX HIT – I & R HITs included in exchange headers I R I1 ::= () ------> R1 ::= <--- Pn, PKr I2 ::= Pn, Sn, PKi, ECR(DHk,x|n), MAC(x,(Pn, Sn, PKi, ECR(DHk,x|n))) ------> I or MI R R2 ::= <--- ECR(DHk,y|n), MAC(x, (ECR(DHk,y|n))) I R Note be end of exchange, parties can ONLY be R and I.

11 Submission 15-11-0364-00-0hip Diet HIP Slide 11 The HIP DEX, rather than a BEX, exchange is identified by a DEX HIT – I & R HITs included in exchange headers IR D-HIP (Start of Exchange ) D-HIP (Pn, PKr) Pn, Sn, PKi, ECR(DHk,x|n), MAC(x,(Pn, Sn, PKi, ECR(DHk,x|n))) ECR(DHk,y|n), MAC(x, (ECR(DHk,y|n)))

12 Submission 15-11-0364-00-0hip Extreame Diet HIP Simple Challenge-Response Protocol –Using one-way hash numbers Slide 12 IR Start of Bootstrapping - Rn Challenge Random Number -k Response with Rn-k Indication of Success of Failure R0 R1 Rn …… Hash k (Rn-k)=Rn ?

13 Submission 15-11-0364-00-0hip Potential Changes to 802.15.4-2006 Associate primitive –MLME-ASSOCIATE.request Encode I1 packet –MLME-ASSOCIATE.indication Encode R1 packet –MLME-ASSOCIATE.response Encode I2 packet –MLME-ASSOCIATE.confirm Encode R2 packet Slide 13

14 Submission 15-11-0364-00-0hip Slide 14 Summary Security bootstrapping using HIP D-HIP is a direct choice for this bootstrapping –Get the keys for MAC encryption –Authenticate the Coordinator and acquire the address ED-HIP is more lightweight than D-HIP

15 Submission 15-11-0364-00-0hip Reference RFC4423 RFC5201 draft-sarikaya-core-sbootstrapping-01 15-10-0412-06-wng0-key-negotiation- using-diet-hi Slide 15

16 Submission 15-11-0364-00-0hip Slide 16 Questions? Thank You!


Download ppt "Submission 15-11-0364-00-0hip Slide 1 Project: IEEE P802.15 Working Group for Wireless Personal Area Networks (WPANs) Submission Title: [Bootstrapping."

Similar presentations


Ads by Google