July 2017 Project: IEEE P802.15 Working Group for Wireless Personal Area Networks (WPANs) Submission Title: [Suitability Evaluation of Encryption Schemes]

Slides:



Advertisements
Similar presentations
July 2017 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: [Research Project BATS] Date Submitted: [10.
Advertisements

November 2016 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: [Use-Cases and Technical Requirements for.
July 2017 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: [Suitability Evaluation Modulation] Date Submitted:
August 2017 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: [Suitability Evaluation of Network Topologies]
June 2006 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: [Proposed Scenarios for Usage Model Document.
May 2018 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: [Discussion on Suitable Parameters for SCHC]
May 2018 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: [Discussion on Suitable Parameters for SCHC]
March 2017 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: [Candidate Technology Qualitative Evaluation]
doc.: IEEE <doc#>
July 2017 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: [Agenda for 3 August 2017 Telco] Date Submitted:
July 2017 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: [Suitability Evaluation Modulation] Date Submitted:
Sept Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: [Qualitative Use-Case Evaluation] Date Submitted:
July 2017 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: [Suitability Evaluation of Connectivity] Date.
July 2017 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: [Suitability Evaluation of FEC Schemes] Date.
doc.: IEEE <doc#>
July 2017 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: [Suitability Evaluation of Network Topologies]
March 2017 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: [Candidate Technology Suitability Evaluation]
July 2017 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: [Suitability Evaluation of MAC Schemes] Date.
June 2017 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: [Agenda for 22. June 2017 Telco] Date Submitted:
August 2017 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: [Suitability Evaluation of Connectivity]
May 2018 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: [Static Context Header Compression] Date Submitted:
August 2018 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: [Draft Agenda for 8 August 2018 Telco] Date.
September 2018 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: [TG w September 2018 Closing Report]
July 2017 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: [Agenda for 3 August 2017 Telco] Date Submitted:
Nov Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: [Smart Grid with LPWAN Extension] Date Submitted:
September 2017 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: [Proposal for Recommendation to WG 15]
July 2018 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: [Draft Agenda for 8 August 2018 Telco] Date.
March 2017 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: [Candidate IEEE Standards and Technologies.
March 2017 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: [Candidate IEEE Standards and Technologies.
July 2017 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: [Suitability Evaluation of Encryption Schemes]
November 2016 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: [LPWA – Regulator Issues] Date Submitted:
March 2017 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: [Information on IEEE IG LPWA to ETSI.
< Sept > Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: [IG LPWA Draft Call for Contributions]
December 2018 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: [Draft Agenda for 08 January 2019 Telco]
November 2018 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: [TG w November 2018 Closing Report]
Feb Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: [Agenda for 22. Feb Telco] Date Submitted:
May 2018 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: [Discussion on Suitable Parameters for SCHC]
Nov Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: [Implementation Approaches for LPWAN Extension]
November 2016 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: [IG LPWA November 2016 Closing Report]
September 2017 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: [IG LPWA Closing Report September 2017.
Oct Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: [Input for coexistence document discussion]
October 2018 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: [Draft Agenda for 17 October 2018 Telco]
July 2017 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: [Suitability Evaluation of FEC Schemes] Date.
March 2017 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: [IG LPWA March 2017 Closing Report] Date Submitted:
June 2017 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: [Agenda for 22. June 2017 Telco] Date Submitted:
August 2017 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: [Suitability of k] Date Submitted:
January 2019 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: [TG w January Closing Report] Date.
doc.: IEEE /XXXr0 Sep 19, 2007 June 2009
Jan Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: [PAR and CSD document discussion] Date Submitted:
July 2017 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: [Update on ETSI LTN] Date Submitted: [9 July,
June 2017 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: [Joerg Robert] Date Submitted: [22 June, 2017”
July 2017 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: [Suitability Evaluation of MAC Schemes] Date.
March 2017 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: [ETSI LTN Activities] Date Submitted: [12.
February 2019 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: [Draft Agenda for 08 January 2019 Telco]
January 2019 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: [TG w January 2019 Closing Report]
April 2017 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: [Agenda for 11. Apr Telco] Date Submitted:
< Oct > Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: [IG LPWA Draft Call for Contributions]
January 2017 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: [IG LPWA January 2017 Closing Report] Date.
May 2018 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: [Static Context Header Compression] Date Submitted:
July 2017 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: [IG LPWA Closing Report July 2017 Plenary]
Nov Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: [IG LPWA Closing Report November 2017 Plenary]
January 2019 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: [Channel bandwidth observations] Date Submitted:
Jan Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: [Proposal for modulation quality in split mode]
July 2019 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: [TG w July 2019 Closing Report] Date.
July 2019 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: [TG w July 2019 Closing Report] Date.
August 2019 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: [Draft Agenda for 02 August 2019 CRG Telco]
July 2019 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: [Comments on Rejected MBS Comments in LB 155]
August 2019 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: [Draft Agenda for 19 August 2019 CRG Telco]
Jan 2008 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: TeraHertz Closing Report Date Submitted: January.
July 2017 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: [Suitability Evaluation of Connectivity] Date.
Presentation transcript:

July 2017 Project: IEEE P802.15 Working Group for Wireless Personal Area Networks (WPANs) Submission Title: [Suitability Evaluation of Encryption Schemes] Date Submitted: [9 July, 2017] Source: [Joerg ROBERT] Company [Friedrich-Alexander University Erlangen-Nuernberg] Address [Am Wolfsmantel 33, 91058 Erlangen, Germany] Voice:[+49 9131 8525373], FAX: [+49 9131 8525102], E-Mail:[joerg.robert@fau.de] Re: [] Abstract: [This document presents the suitability evaluation for different encryption schemes that may be used for LPWAN.] Purpose: [Presentation within IG LPWA] Notice: This document has been prepared to assist the IEEE P802.15. It is offered as a basis for discussion and is not binding on the contributing individual(s) or organization(s). The material in this document is subject to change in form and content after further study. The contributor(s) reserve(s) the right to add, amend or withdraw material contained herein. Release: The contributor acknowledges and accepts that this contribution becomes the property of IEEE and may be made publicly available by P802.15. Joerg ROBERT, FAU Erlangen-Nuernberg

Suitability Evaluation of Encryption Schemes July 2017 Suitability Evaluation of Encryption Schemes Joerg Robert, FAU Erlangen-Nuernberg Joerg Robert, FAU Erlangen-Nuernberg

Potential Options Secure Element More complex device Time to boostrap <month year> Potential Options Secure Element More complex device Time to boostrap More energy Cost Joerg Robert, FAU Erlangen-Nuernberg

doc.: IEEE 802.15-<doc#> <month year> doc.: IEEE 802.15-<doc#> July 2017 Symmetric Key ( I / II ) Transmitter and receiver know the same key which has to be kept secret Pros Basis for many ciphers Relatively low encoding/decoding complexity Cons Difficult key exchange Secret key on user equipment Over the air key updates difficult <author>, <company>

Symmetric Key ( II / II ) Communication Mode Uplink Downlink/Uplink July 2017 Symmetric Key ( II / II ) Communication Mode Uplink Downlink/Uplink Uplink / Broadcast Downlink Data Length <= 16 bytes <= 64 bytes <= 256 bytes > 256 bytes Data Security Layer-2 Layer-3 End-to-End Secure Authentication Data Period Occasionally, less than 1/day Occasionally 1/day Occasionally 1/hour Occasionally, more than 1/hour Periodically 1/day Periodically 1/hour Periodically, more than 1/hour Power Supply CR 2025 2xAA Energy Harvesting External Joerg Robert, FAU Erlangen-Nuernberg

doc.: IEEE 802.15-<doc#> <month year> doc.: IEEE 802.15-<doc#> July 2017 Public Key ( I / II ) Transmitter uses public key for the encryption Decryption with private key that is only known to receiver Pros Basis for many authentication algorithms Private key only known to receiver Possibility of key exchange (only if uplink / downlink) Cons High encoding / decoding complexity <author>, <company>

Public Key ( II / II ) Communication Mode Uplink Downlink/Uplink July 2017 Public Key ( II / II ) Communication Mode Uplink Downlink/Uplink Uplink / Broadcast Downlink Data Length <= 16 bytes <= 64 bytes <= 256 bytes > 256 bytes Data Security Layer-2 Layer-3 End-to-End Secure Authentication Data Period Occasionally, less than 1/day Occasionally 1/day Occasionally 1/hour Occasionally, more than 1/hour Periodically 1/day Periodically 1/hour Periodically, more than 1/hour Power Supply CR 2025 2xAA Energy Harvesting External Joerg Robert, FAU Erlangen-Nuernberg

doc.: IEEE 802.15-<doc#> <month year> doc.: IEEE 802.15-<doc#> July 2017 AES-128/256 ( I / II ) Transmitter and receiver use symmetric key Pros Well known algorithms used in many applications Acceptable encoding / decoding complexity Hardware acceleration in many embedded systems Strong protection Cons Requires symmetric key  secret key inside user equipment Fixed block length of 128 bits <author>, <company>

AES-128/256 ( II / II ) Communication Mode Uplink Downlink/Uplink July 2017 AES-128/256 ( II / II ) Communication Mode Uplink Downlink/Uplink Uplink / Broadcast Downlink Data Length <= 16 bytes <= 64 bytes <= 256 bytes > 256 bytes Data Security Layer-2 Layer-3 End-to-End Secure Authentication Data Period Occasionally, less than 1/day Occasionally 1/day Occasionally 1/hour Occasionally, more than 1/hour Periodically 1/day Periodically 1/hour Periodically, more than 1/hour Power Supply CR 2025 2xAA Energy Harvesting External Joerg Robert, FAU Erlangen-Nuernberg

doc.: IEEE 802.15-<doc#> <month year> doc.: IEEE 802.15-<doc#> July 2017 RSA ( I / II ) Transmitter uses public key for the encryption Decryption with private key that is only known to receiver System based on prime numbers as trap-door function Pros Well known algorithms used in many applications Strong protection Method can be used for secure authentication Allows for key updates Cons Approx. 1000 time more complex than AES  normally only used for key exchange Long key length of several kBit <author>, <company>

RSA ( II / II ) Communication Mode Uplink Downlink/Uplink July 2017 RSA ( II / II ) Communication Mode Uplink Downlink/Uplink Uplink / Broadcast Downlink Data Length <= 16 bytes <= 64 bytes <= 256 bytes > 256 bytes Data Security Layer-2 Layer-3 End-to-End Secure Authentication Data Period Occasionally, less than 1/day Occasionally 1/day Occasionally 1/hour Occasionally, more than 1/hour Periodically 1/day Periodically 1/hour Periodically, more than 1/hour Power Supply CR 2025 2xAA Energy Harvesting External Joerg Robert, FAU Erlangen-Nuernberg

Elliptic Curves ( I / II ) <month year> doc.: IEEE 802.15-<doc#> July 2017 Elliptic Curves ( I / II ) Transmitter uses public key for the encryption Decryption with private key that is only known to receiver Pros Similiar properties to RSA based on prime numbers More difficult to hack compared to prime numbers for similar key length  shorter keys Method can be used for secure authentication Allows for key updates Cons Significantly more complex than AES <author>, <company>

Elliptic Curves ( II / II ) July 2017 Elliptic Curves ( II / II ) Communication Mode Uplink Downlink/Uplink Uplink / Broadcast Downlink Data Length <= 16 bytes <= 64 bytes <= 256 bytes > 256 bytes Data Security Layer-2 Layer-3 End-to-End Secure Authentication Data Period Occasionally, less than 1/day Occasionally 1/day Occasionally 1/hour Occasionally, more than 1/hour Periodically 1/day Periodically 1/hour Periodically, more than 1/hour Power Supply CR 2025 2xAA Energy Harvesting External Joerg Robert, FAU Erlangen-Nuernberg

Over the Air Key Update ( I / II ) <month year> doc.: IEEE 802.15-<doc#> July 2017 Over the Air Key Update ( I / II ) Network updates key Pros Improved security Simple reconfiguration Cons Requires asymmetric encryption Requires bi-directional communication <author>, <company>

Over the Air Key Update ( II / II ) July 2017 Over the Air Key Update ( II / II ) Communication Mode Uplink Downlink/Uplink Uplink / Broadcast Downlink Data Length <= 16 bytes <= 64 bytes <= 256 bytes > 256 bytes Data Security Layer-2 Layer-3 End-to-End Secure Authentication Data Period Occasionally, less than 1/day Occasionally 1/day Occasionally 1/hour Occasionally, more than 1/hour Periodically 1/day Periodically 1/hour Periodically, more than 1/hour Power Supply CR 2025 2xAA Energy Harvesting External Joerg Robert, FAU Erlangen-Nuernberg

Any Questions or Comments? July 2017 Any Questions or Comments? Joerg Robert, FAU Erlangen-Nuernberg