November 2011 Jin-Meng Ho and David Davenport. doc.: IEEE 802. 15-11-0790-00-0006 Slide 1Submission Project: IEEE P802.15 Working Group for Wireless Personal.

Slides:



Advertisements
Similar presentations
Doc.: IEEE tg9-proposed-document-changes Submission Nov 2013 Robert Moskowitz, VerizonSlide 1 Project: IEEE P Working Group for.
Advertisements

Doc.: IEEE xxxxx Submission doc. : IEEE Slide 1 Junbeom Hur and Sungrae Cho, Chung-Ang University Project: IEEE P
Doc.: Submission, Slide 1 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: [Securing the Network.
Doc.: IEEE a-Updating-15-7-security Submission May 2015 Robert Moskowitz, HTT ConsultingSlide 1 Project: IEEE P Working Group for.
Doc.: IEEE Hop-Discuss Submission July 2014 Robert Moskowitz, Verizon Slide 1 Project: IEEE P Working Group for Wireless Personal.
Doc.: IEEE KMP-Transport-Joint Submission July 2012 Robert Moskowitz, Verizon Slide 1 Project: IEEE P Working Group for Wireless.
Doc.: IEEE HIP-over-TG9 Submission May 2012 Robert Moskowitz, Verizon Slide 1 Project: IEEE P Working Group for Wireless Personal.
Doc.: IEEE tg9-Opening-Report-mar-2015 Submission Mar 2015 Robert Moskowitz, HTT Consulting Slide 1 Project: IEEE P Working Group.
Doc.: IEEE kmp Submission September 2011 Robert Moskowitz, Verizon Slide 1 Project: IEEE P Working Group for Wireless Personal.
IEEE MEDIA INDEPENDENT HANDOVER DCN:
Submission Title: [Add name of submission]
Project: IEEE 802 EC Privacy Recommendation Study Group
Jul 12, /12/10 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: TG10 (L2R) Closing Report.
<month year> <doc.: IEEE doc> January 2013
Submission Title: [TG1 Presentation to Bluetooth PM]
Robert Moskowitz, Verizon
doc.: IEEE <doc#>
<month year> <doc.: IEEE doc> May 2016
July 2013 Robert Moskowitz, Verizon
Robert Moskowitz, Verizon
Robert Moskowitz, Verizon
Project: IEEE 802 EC Privacy Recommendation Study Group
Nov 2013 Robert Moskowitz, Verizon
Robert Moskowitz, Verizon
Robert Moskowitz, Verizon
Robert Moskowitz, Verizon
1/2/2019<month year> doc.: IEEE Jan 2013
Robert Moskowitz, Verizon
Robert Moskowitz, Verizon
Robert Moskowitz, Verizon
Robert Moskowitz, Verizon
Robert Moskowitz, Verizon
January 16, 2019 doc.: IEEE r0 September, 2004
<month year> doc.: IEEE < e>
Nov 2013 Robert Moskowitz, Verizon
Submission Title: [R2SG Monday Meeting] Date Submitted: [18Sept00]
May 2015 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: May 2015 closing report Date Submitted: May.
<month year> <doc.: IEEE doc> May 2016
Jan 2014 Robert Moskowitz, Verizon
July 2014 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: July 2014 closing report Date Submitted: July.
Submission Title: [Add name of submission]
Sept 2010 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: Proposed MAC Comment Resolutions Date Submitted:
doc.: IEEE <doc#>
July 2013 Robert Moskowitz, Verizon
Nov 2013 Robert Moskowitz, Verizon
Robert Moskowitz, Verizon
April 19 July 2010 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: WNG Closing Report for San Diego.
Robert Moskowitz, Verizon
Submission Title: TG4r November 2014 Closing Report
November 2015 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: November 2015 closing report Date Submitted:
Robert Moskowitz, Verizon
Jul 12, /12/10 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: TG4n Chinese Medical Band Closing.
May 2013 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: May 2013 closing report Date Submitted: May.
doc.: IEEE <doc#>
Robert Moskowitz, Verizon
Tero Kivinen, AuthenTec
Robert Moskowitz, Verizon
Submission Title: May Closing report for IG 9a
Submission Title: May Closing report for IG 9a
Robert Moskowitz, Verizon
Robert Moskowitz, Verizon
Tero Kivinen, AuthenTec
Robert Moskowitz, Verizon
September 2008 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: [Suggested TG3c PAR Changes] Date Submitted:
Submission Title: TG9ma Closing Report for July Meeting
July 2003 doc.: IEEE <03/242> July 2003
Jul 12, /12/10 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: Dependable Interest Group Closing.
Submission Title: TG9ma Agenda for September Meeting
Submission Title: TG9ma Closing Report for July Meeting
Submission Title: TG9ma Closing Report for September Meeting
Presentation transcript:

November 2011 Jin-Meng Ho and David Davenport. doc.: IEEE Slide 1Submission Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: BAN Security Snapshot and KMP PAR Review Date Submitted: November 7, 2011 Source: Jin-Meng Ho (1) and David Davenport (2) (1) Texas Instruments, TI Blvd, Dallas, TX, USA (2) GE Global Research, 1 Research Circle, K1-3C33A, Niskayuna, NY 12309, USA Re: security vs. KMP PAR Abstract: This presentation provides a summary of the security mechanisms specified in all drafts. It also identifies the incorrect statements made in the KMP PAR doc. Purpose: To promote/facilitate public awareness/understanding of the self-contained security services provided in the BAN draft standard. And to request for amendment of the KMP PAR with respect to its scope and language. Notice: This document has been prepared to assist the IEEE P It is offered as a basis for discussion and is not binding on the contributing individual(s) or organization(s). The material in this document is subject to change in form and content after further study. The contributor(s) reserve(s) the right to add, amend or withdraw material contained herein. Release: The contributors acknowledge and accept that this contribution becomes the property of IEEE and may be made publicly available by P802.15

November 2011 Jin-Meng Ho and David Davenport. doc.: IEEE Slide 2Submission KMP PAR (Doc ) misrepresents TG6 security and must be revised draft (IEEE P ™/D04) provides key establishment mechanisms. This has been the case since D01 was created and released in May TG6 requests that all references made by KMP PAR to , explicit or implicit, be removed.

November 2011 Jin-Meng Ho and David Davenport. doc.: IEEE Slide 3Submission KMP PAR (Doc ) 1.1 Project Number: P Title: Recommended Practice for transport of a key management protocol (KMP) applied to IEEE standards 5.3 Is the completion of this standard dependent upon the completion of another standard: Yes If yes please explain: This proposal uses facilities provided by amendment IEEE e. In addition, it provides a transport mechanism for IEEE Purpose: This Recommended Practice describes support for transporting KMPs to support the security functionality present in IEEE Std , IEEE Std , and IEEE Std Need for the Project: standards have always supported datagram security, but have not provided a mechanism for establishing the keys used by this feature and upper layer key management is complex to deploy. Lack of key management support in standards results in weak keys which is a common avenue for attacking the security system. Adding KMP support is critical to a proper security framework. This project will provide a Recommended Practice for the transport of a KMP within standards. It will also provide guidelines for commonly used KMPs like IETF's HIP, IKEv2, IEEE 802.1X, and 4-Way-Handshake. 5.6 Stakeholders for the Standard: The stakeholders include implementers and those who deploy standards that need network security and thus need a mechanism for initiating and maintaining the security keys. …

November 2011 Jin-Meng Ho and David Davenport. doc.: IEEE Slide 4Submission Our October 21 to Robert Moskowitz and TG6 Reflector draft (IEEE P ™/D04) does provide key establishment mechanisms as first introduced in 5.6 and Figure 5 and then specified in 8.1 and 8.2. This has been the case since D01 was created and released in May Guidelines for the “KMPs” listed do not apply to , since some of them (such as those for 4-way handshake) already appear in the draft and additional guidelines would only create confusions and conflicts, while some others (like those for HIP, IKEv2 and 802.1X) have been specified in relevant IETF and IEEE specs for specific upper layers. Starting from the title, “transport of a key management protocol (KMP)” is not supportable or implementable, since a protocol – whatever it is – cannot be transported in a network. If the intent was “transport of keys”, then the scope of the PAR should not cover widely used key agreement protocols which do not involve transport of keys from one device to another. Further, in the cryptography literature, it is typically techniques or provisions but not protocols that are used for key management, and it is mainly key establishment but not key management that is invoked for key transport or key agreement. If this PAR and this new group use key management as its keyword, then their scope needs to be defined accordingly.

November 2011 Jin-Meng Ho and David Davenport. doc.: IEEE Slide 5Submission BAN Security Overview IEEE P D01 – D05 drafts: BAN security is “self-contained”, providing: – Activation of pre-shared master keys and establishment of new master keys for creation of pairwise temporal keys (session keys) – Creation of pairwise temporal keys based on master keys and transport of group temporal keys secured by pairwise temporal keys – Authentication and encryption of messages/frames using pairwise/group temporal keys

November 2011 Jin-Meng Ho and David Davenport. doc.: IEEE Slide 6Submission BAN Security Outline IEEE P D01 – D05 drafts: 8.1 Security association and disassociation – Master key pre-shared association – Unauthenticated association – Public key hidden association – Password authenticated association – Display authenticated association – Disassociation 8.2 PTK creation and GTK distribution – PTK creation – GTK distribution 8.3 Message security – Frame authentication, encryption, and decryption – Replay protection

November 2011 Jin-Meng Ho and David Davenport. doc.: IEEE Slide 7Submission BAN Security Summary Security association and disassociation – Pre-shared master key activation: simple two-way handshake – New master key agreement: ECC based D-H key exchange/confirmation Unauthenticated – used with precaution Public key hidden – authenticated via protected access to node’s public key by hub Password authenticated – authenticated via a (simple) shared password between node and hub Display authenticated – authenticated via numerical display at both sides – Disassociation: authenticated repeal of current master key by either party PTK creation and GTK distribution – PTK creation: using AES based CMAC – GTK distribution: PTK secured transport of GTK Message security – Frame authentication/encryption: based on AES-128 CCM Authenticated but not encrypted Authenticated and encrypted Control type frames, like I-Ack, may be optionally authenticated – Short overhead, long key lifespan: split security sequence number bytes

November 2011 Jin-Meng Ho and David Davenport. doc.: IEEE Slide 8Submission Requested Changes to KMP PAR 1.1 Project Number: P Title: Recommended Practice for transport of a key management protocol (KMP) applied to IEEE standards except which includes key establishment protocols. 5.3 Is the completion of this standard dependent upon the completion of another standard: Yes If yes please explain: This proposal uses facilities provided by amendment IEEE e. In addition, it provides a transport mechanism for IEEE Purpose: This Recommended Practice describes support for transporting KMPs to support the security functionality present in IEEE Std , IEEE Std , and IEEE Std but not IEEE Std Need for the Project: standards have always supported datagram security, but, with the exception of , have not provided a mechanism for establishing the keys used by this feature and upper layer key management is complex to deploy. Lack of key management support in some standards results in weak keys which is a common avenue for attacking the security system. Adding KMP support is critical to a proper security framework. This project will provide a Recommended Practice for the transport of a KMP within standards except It will also provide guidelines for commonly used KMPs like IETF's HIP, IKEv2, IEEE 802.1X, and 4-Way- Handshake. 5.6 Stakeholders for the Standard: The stakeholders include implementers and those who deploy some standards that need network security and thus need a mechanism for initiating and maintaining the security keys. …

November 2011 Jin-Meng Ho and David Davenport. doc.: IEEE Slide 9Submission TG6 Motion TG6 requests that the requested changes on slide 8 of this document ( ) be made to the KMP PAR to exclude from the scope.