IoT Onboarding for Date: Authors: November 2018

Slides:



Advertisements
Similar presentations
Bootstrapping Key Infrastructures Max Pritikin IETF 91, 10 Nov 2014 Aloha!
Advertisements

Doc.: IEEE /1066r2 Submission July 2011 Robert Moskowitz, VerizonSlide 1 Link Setup Flow Date: Authors: NameCompanyAddressPhone .
Doc.: IEEE ai Submission Paul Lambert, Marvell TGai Discovery Proposal Author: Abstract Short high-level proposal for discovery techniques.
Submission doc.: IEEE 11-14/0877r0 July 2014 SK Yong et.al., AppleSlide 1 Generic Service Discovery Proposal: Dynamic Bloom Filter Operation Date:
Submission doc.: IEEE 11-12/0553r4 May 2012 Jarkko Kneckt, NokiaSlide 1 Response Criteria of Probe Request Date: Authors:
Doc.: IEEE /2491r00 Submission September 2007 D. Eastlake (Motorola), G. Hiertz (Philips)Slide 1 WLAN Segregated Data Services Date:
Doc.: IEEE /2161r1 Submission July 2007 Slide 1 July 2007 Donald Eastlake 3rd, MotorolaSlide 1 Segregated Data Services in Date:
Doc.: IEEE /402r0 Submission May 2005 Stefano M. FaccinSlide 1 Notice: This document has been prepared to assist IEEE It is offered as.
Doc.: IEEE /0448r0 Submission March, 2007 Srinivas SreemanthulaSlide 1 Joiint TGU : Emergency Identifiers Notice: This document has been.
Doc.: IEEE /1313r1 Submission November 2013 Stephen McCann, BlackberrySlide 1 TGaq Mini Tutorial Date: Authors:
Doc.: IEEE /1313r2 Submission November 2013 Stephen McCann, BlackberrySlide 1 TGaq Mini Tutorial Date: Authors:
Doc.: IEEE /1313r4 Submission November 2013 Stephen McCann, BlackberrySlide 1 TGaq Mini Tutorial Date: Authors:
Bootstrapping Key Infrastructures
FILS Reduced Neighbor Report
Month Year doc.: IEEE yy/xxxxr0 May 2012
Segregated Data Services
Katrin Hoeper Channel Bindings Katrin Hoeper
Proposed SFD Text for ai Link Setup Procedure
TGaq Service Transaction Protocol for ANDSF Discovery Service
IEEE 802 wide project on Emergency Services
Discussions on FILS Authentication
MMWave Distribution Network Discovery
TGaq Design Option for One-way Service Discovery Protocol
Proposed response to 3GPP ED request
Wireless LAN Security 4.3 Wireless LAN Security.
Opportunistic Wireless Encryption
WLAN Segregated Data Services
MMWave Distribution Network Discovery
What is u? Date: Authors: January 2006 January 2006
MAC Address Hijacking Problem
TGaq Design Options Date: Authors: January 2013
Group-addressed GAS Date: Authors: December 2016 July 2013
Multi-band Discovery Assistance
Wednesday, 9:30-12:00 Morning session I, Van Horne
Enhancements to Mesh Discovery
Multi-band Discovery Assistance
OCT based 6 GHz AP Operation Discussion
Follow-Up on WUR Discovery Frame and Discovery Channel
TGaq Design Options Date: Authors: March 2013 March 2013
FILS Reduced Neighbor Report
Segregated Data Services
Group-addressed GAS Date: Authors: December 2016 July 2013
Pre-Authentication Authentication of Management Frames
Follow-Up on WUR Discovery Frame and Discovery Channel
Recap At IETF 97 we presented the Voucher document for the first time as an ANIMA draft Bootstrapping Design team has met weekly since, about 50% discussion.
AP Power Down Notification
AP Power Down Notification
Month Year doc.: IEEE yy/xxxxr0
TGaq Mini Tutorial Date: Authors: November 2013
Link Setup Flow July 2011 Date: Authors: Name Company
What is u? Date: Authors: January 2006 January 2006
IETF Network Discovery and Selection Overview
TGaq Design Options Date: Authors: March 2013 March 2013
Group-addressed GAS Date: Authors: November 2016 July 2013
Proposal for authentication cluster
802.11u Bootstrap Procedure with
Relationship between peer link and physical link
Segregated Data Services in
FILS Frame Content Date: Authors: February 2008
Bootstrapping Key Infrastructure over EAP draft-lear-eap-teap-brski
Month Year doc.: IEEE yy/xxxxr0 May 2012
EAP Method Requirements for Emergency Services
Link Setup Flow July 2011 Date: Authors: Name Company
Month Year doc.: IEEE yy/xxxxr0
Management Frame Priority SG Input
draft-friel-acme-integrations
TGu/TGv Joint Meeting Date: Authors: May 2008 Month Year
Reducing Overhead in Active Scanning
Reducing Overhead in Active Scanning
Update on BRSKI-AE – Support for asynchronous enrollment
Presentation transcript:

IoT Onboarding for 802.11 Date: 2018-11-11 Authors: November 2018 doc.: IEEE 802.11-18/810r1 November 2018 IoT Onboarding for 802.11 Date: 2018-11-11 Authors: Jerome Henry, Cisco Jerome Henry, Cisco

November 2018 doc.: IEEE 802.11-18/810r1 November 2018 Abstract This document presents challenges around IoT onboarding for 802.11, and suggests a few areas of possible cooperation between 802.11 and IETF Jerome Henry, Cisco Jerome Henry, Cisco

Basic onboarding is simple A headless IoT device needs to be told the SSID and its associated credentials At this basic level (“level 1”), connectivity is the main objective Level 1: just need the SSID / PSK Level 1: I accept any client with the right credentials Slide 3 Jerome Henry, Cisco

Basic Provisioning is simple Several solutions have been developed to solve this provisioning problem This can be seen as an “individual scale” provisioning problem OOB (NFC, BT etc.) or P2P Wi-Fi SSID, credentials Level 1: just need the SSID / PSK Level 1: I accept any client with the right credentials Slide 4 Jerome Henry, Cisco

Provisioning at Scale is not solved yet “individual scale” provisioning solutions are challenged for “building scale” provisioning scenarios Slide 5 Jerome Henry, Cisco

Provisioning at Scale is not solved yet “Individual scale” provisioning techniques only imperfectly solve the “building scale” case Potential excessive airtime consumption “Regular” 802.11 process vs “IoT” process mismatches Individual P2P communication and provisioning (times n individual devices) Slide 6 Jerome Henry, Cisco

Provisioning at Scale is not solved yet For “building scale” provisioning, the awaking IoThing needs to detect “IoT SSIDs” through which inline automated onboarding mechanism may exist 802.11u, 802.11aq can advertise IoT support Temporal tunnel could be used for secure provisioning (e.g. RFC 8110, EAP-TEAP-BRSKI, others) Infrastructure needs to: Advertise “IoT friendliness” Automate provisioning Slide 7 Jerome Henry, Cisco

Conclusion 1 802.11 messaging could be augmented to facilitate IoT onboarding at scale Specific “IoT onboarding” values in 802.11u/aq, in beacons and probe responses Options could be set to signal secure provisioning (e.g. RFC 8110) Slide 8 Jerome Henry, Cisco

Increased IoThing side Requirements In multi-tenant scenarios, the IoThing needs to know the ‘right’ SSID “Honest neighbors” also should not want to onboard the Thing This can be achieved when the infrastructure proves that it “knows” the IoThing SSID1 SSID2 Level 2: IoT may need to determine the “correct” SSID Slide 9 Jerome Henry, Cisco

Increased IoThing side Requirements Requesting IoThing may position an “is it you” question in probe/association request frames IoThing needs to add an identifier: MAC address / serial Vendor identifier Public key (BRSKI, PKI) SSID1 SSID2 Probe + “is it you?” Level 2: IoT may need to determine the “correct” SSID Slide 10 Jerome Henry, Cisco

IoThing Side Identifier Challenges Some verticals will only need “what is that thing” value (object category) Other verticals will need individual thing identification (thou shalst not onboard your neighbor lightbulb even if they use the same brand as yours) Other verticals will mandate anti- spoofing provisions SSID1 SSID2 Probe + “is it you?” Level 2: IoT may need to determine the “correct” SSID Level 2: AP only accepts the right client, with the right credentials These different requirements are great area of potential cooperation with the IETF BRSKI* effort *Bootstrapping Remote Secure Key Infrastructures Slide 11 Jerome Henry, Cisco

Infrastructure Side knowledge proof The AP can return a sign, or proof of knowledge, confirming that the IoThing communicates with the ‘right’ SSID: Complementary value (e.g. serial) Bloom filter BRSKI Voucher, PKI No proof SSID1 SSID2 Proof that I know you Level 2: IoT may need to determine the “correct” SSID Level 2: AP only accepts the right client, with the right credentials Complementary value, bloom filter are for IoThing level 2 needs, PKI, BRSKI can fulfill infrastructure level 2 needs Slide 12 Jerome Henry, Cisco

Infrastructure Side knowledge proof Level 2: IoT may need to determine the “correct” SSID SSID2 Is it you? Response + comeback Backend proof collection Is it you? Response + proof If the proof is given at the probe phase, the AP may need to go search for an answer This process may require a comeback phase Slide 13 Jerome Henry, Cisco

Conclusion 2 Specific “IoT identifiers” fields could be added to probe/association requests Identifiers may be associated with exchange type (in following slides) AP probe/association response could include comeback values, proof IE values Slide 14 Jerome Henry, Cisco

Level 3 for Secure networks For higher security networks, and/or critical objects, a third level of security may be needed IoThing may need anti-evil twin protection Network may need anti-tempering (open boxes) measures for new IoThings Manufacturer AAA Registrar MASA Level 3: prove that you are allowed to onboard me Level 3: prove that you are allowed to onboard, and were not tampered with Slide 15 Jerome Henry, Cisco

Level 3 for Secure networks Manufacturer AAA Registrar MASA Level 3: prove that you are allowed to onboard me Level 3: prove that you are allowed to onboard, and were not tampered with IoThing provides a public cert Cert is verified by MASA/Manufacturer and approved Proof of ownership is returned BRSKI allows for such level 3 requirements on both sides Slide 16 Jerome Henry, Cisco

Approaches to onboarding WPS Simple Serial # DPP BRSKI w/ sales integration BRSKI no sales integration BRSKI with POP Correct Network Selection Yes No Onboard without Internet access Proof of ownership Yes** Yes*** Supply chain security Partial Hands free* Well secured Maybe Status Here Not planned Std Partially standardized Beginning Key type None Ser # Asym. X.509 X.509 + private Manufacturing complexity Nvram Serial# Public Key + label/BOM Cert+Back End Integration Cert Cert+label/BOM *Hands free = no label or BOM integration **Assumes protection of proof of ownership ***Assumes Internet access to enterprise AAA at some point Slide 17 Jerome Henry, Cisco

November 2018 Conclusion 3 IoT onboarding presents new requirements for 802.11 exchanges Collaboration with IETF may help better refine the associated needs for 802.11 New IEs in existing or new frames may be proposed to solve the various use cases Jerome Henry, Cisco

November 2018 References BRSKI over IEEE 802.11, draft-friel-anima-brski- over-802dot11-00, https://datatracker.ietf.org/doc/draft-friel-anima-brski- over-802dot11/ Proof of Possession to Devices for Onboarding, draft- lear-brski-pop-00, https://datatracker.ietf.org/doc/draft-lear-brski-pop/ Worth noting: IETF opsawg and anima mailing lists, upcoming iot-onboarding@ietf.org mailing list Jerome Henry, Cisco