Submission hip Slide 1 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: [Bootstrapping using HIP] Date Submitted: [11 May, 2011] Source: [Cao Zhen, Liu Dapeng] Company [China Mobile Communications Corporation] Address [28 Xuanwumenxi Ave. Beijing, China] Voice:[ ], FAX: [ ], Abstract:[This document discusses the method of using HIP and diet-HIP to bootstrap the IEEE network ] Purpose:[For information and discussion] Notice:This document has been prepared to assist the IEEE P It is offered as a basis for discussion and is not binding on the contributing individual(s) or organization(s). The material in this document is subject to change in form and content after further study. The contributor(s) reserve(s) the right to add, amend or withdraw material contained herein. Release:The contributor acknowledges and accepts that this contribution becomes the property of IEEE and may be made publicly available by P
Submission hip Slide 2 Bootstrapping WPAN using HIP Zhen Cao, Dapeng Liu April 25, 2011
Submission hip The Problem IEEE standards ensure connectivitiy at MAC and Phy layer IETF standards achieve IP connectivity IEEE MAC encodes encryption payload, but no way to initiate the keys How to initially configure the network? –How nodes authenticate to the network –How nodes get the IP address –… –In one word, how to bootstrap? Slide 3
Submission hip What’s Bootstrapping Any process before the network can operate –Link-layer address –MAC layer configuration –Encryption/authentication keys Slide 4
Submission hip System level requirements Data Confidentiality Data Integrity Keys and key freshness Multi domain support Identities Slide 5
Submission hip Bootstrapping using HIP End-to-end bootstrapping –Using HIP to establish the SA between two end points –Using the HIP-established SA to delieve the management objects Slide 6 PAN Coordinator Bootstrapping and get the configuration objects Other network
Submission hip What’s HIP Slide 7 7 IP layer Fragmentation Link Layer ForwardingForwarding IPsec Transport Layer End-to-end, HITs Hop-by-hop, IP addresses HIP MobilityMobility Multi-homingMulti-homing v4/v6 bridge
Submission hip HIP Basic Exchange Initiator Responder I1: HIT I, HIT R or NULL R1: HIT I, [HIT R, puzzle, DH R, HI R ] sig I2: [HIT I, HIT R, solution, DH I, {HI I }] sig R2: [HIT I, HIT R, authenticator] sig User data messages Control Data
Submission hip The problem with HIP HIP BEX (Basic Exchange) is heavy weight –Puzzle solutions –SA negotiation –IPsec Slide 9
Submission hip Diet HIP Slide 10 The HIP DEX, rather than a BEX, exchange is identified by a DEX HIT – I & R HITs included in exchange headers I R I1 ::= () > R1 ::= <--- Pn, PKr I2 ::= Pn, Sn, PKi, ECR(DHk,x|n), MAC(x,(Pn, Sn, PKi, ECR(DHk,x|n))) > I or MI R R2 ::= <--- ECR(DHk,y|n), MAC(x, (ECR(DHk,y|n))) I R Note be end of exchange, parties can ONLY be R and I.
Submission hip Diet HIP Slide 11 The HIP DEX, rather than a BEX, exchange is identified by a DEX HIT – I & R HITs included in exchange headers IR D-HIP (Start of Exchange ) D-HIP (Pn, PKr) Pn, Sn, PKi, ECR(DHk,x|n), MAC(x,(Pn, Sn, PKi, ECR(DHk,x|n))) ECR(DHk,y|n), MAC(x, (ECR(DHk,y|n)))
Submission hip Extreame Diet HIP Simple Challenge-Response Protocol –Using one-way hash numbers Slide 12 IR Start of Bootstrapping - Rn Challenge Random Number -k Response with Rn-k Indication of Success of Failure R0 R1 Rn …… Hash k (Rn-k)=Rn ?
Submission hip Potential Changes to Associate primitive –MLME-ASSOCIATE.request Encode I1 packet –MLME-ASSOCIATE.indication Encode R1 packet –MLME-ASSOCIATE.response Encode I2 packet –MLME-ASSOCIATE.confirm Encode R2 packet Slide 13
Submission hip Slide 14 Summary Security bootstrapping using HIP D-HIP is a direct choice for this bootstrapping –Get the keys for MAC encryption –Authenticate the Coordinator and acquire the address ED-HIP is more lightweight than D-HIP
Submission hip Reference RFC4423 RFC5201 draft-sarikaya-core-sbootstrapping wng0-key-negotiation- using-diet-hi Slide 15
Submission hip Slide 16 Questions? Thank You!