IEEE 802.21 MEDIA INDEPENDENT HANDOVER DCN: 21-15-0051-02-REVP-Proposal-on-the-security-of-802.21 Title: Proposal on the security of 802.21 Date Submitted:

Slides:



Advertisements
Similar presentations
1 IEEE MEDIA INDEPENDENT HANDOVER DCN: sec Title: ERP proposal Date Submitted: October 11, 2011 Authors or Source(s): Fernando Bernal-Hidalgo,
Advertisements

21-07-xxxx IEEE MEDIA INDEPENDENT HANDOVER DCN: Title: MIH Protocol Security Date Submitted: December, 2007 Presented.
IEEE MEDIA INDEPENDENT HANDOVER DCN: Title: Utilizing terminal identifier to recognize the reserved resources.
MuGM IEEE MEDIA INDEPENDENT HANDOVER DCN: Title: Group management mechanisms Date Submitted: November, 2012 Authors or Source(s): Daniel.
IEEE MEDIA INDEPENDENT HANDOVER DCN: xxxx-00-MuGM Title: Outline of MuGM Date Submitted: January, 15th, 2013 Presented at IEEE.
IEEE MEDIA INDEPENDENT HANDOVER DCN: xxxx-00-MuGM Title: Demo Scenario Date Submitted: May, 16th, 2013 Presented at IEEE session in.
IEEE MEDIA INDEPENDENT HANDOVER DCN: Title: Analysis on Identifiers Date Submitted: January 9, 2006 Presented.
MuGM IEEE MEDIA INDEPENDENT HANDOVER DCN: MuGM Title: Definition of IEEE d multicast identifiers Date Submitted:
xxx IEEE MEDIA INDEPENDENT HANDOVER DCN: xxxx Title: Information Service Flow Update Date Submitted: October 22, 2006.
MuGM IEEE MEDIA INDEPENDENT HANDOVER DCN: MuGM Title: Proposal to amend the group manipulation command Date Submitted:
MuGM IEEE MEDIA INDEPENDENT HANDOVER DCN: Title: Use of certificates as a base security level for securing PoS/MN multicast communication.
1 IEEE MEDIA INDEPENDENT HANDOVER DCN: sec Title: Message Flow Date Submitted: March 1, 2011 Authors or Source(s): Fernando Bernal-Hidalgo,
IEEE MEDIA INDEPENDENT HANDOVER DCN: Title: MIH Handover Initiation Strategy Consistency Date Submitted: November,
Doc.: IEEE /0310r0 Submission Sept 2007 Srinivas Sreemanthula Slide 1 IEEE MEDIA INDEPENDENT HANDOVER DCN: MIH-Security-Options.ppt.
IEEE MEDIA INDEPENDENT HANDOVER DCN: Title: Notify high layer when events change Date Submitted: Jan, 06,
21-07-xxxx IEEE MEDIA INDEPENDENT HANDOVER DCN: xxxx Title: Problem Scenario Date Submitted: September, 2007 Presented at.
IEEE MEDIA INDEPENDENT HANDOVER DCN: Title: FMCA MIH Work Item Date Submitted: March, 2009 Presented at IEEE.
IEEE MEDIA INDEPENDENT HANDOVER DCN: Title: MIH Handover Initiation Strategy Consistency Date Submitted: November,
IEEE MEDIA INDEPENDENT HANDOVER DCN: Title: Comments Date Submitted: Jan, 06, 2006 Presented at IEEE
IEEE MEDIA INDEPENDENT HANDOVER DCN: REVP-Proposal-on-the-security-of Title: Proposal on the security of Date Submitted:
IEEE MEDIA INDEPENDENT HANDOVER DCN: Title: Optimize MIIS Get Information Message Date Submitted: February.
IEEE MEDIA INDEPENDENT HANDOVER DCN: bcst Title: Overview of Draft P802.21b/D0.01 Date Submitted: May 11, 2010 Presented at IEEE
IEEE MEDIA INDEPENDENT HANDOVER DCN: 100 Title: Cross Domain Trigger and Handover Talking Points Date Submitted: July 13, 2004.
21-07-xxxx IEEE MEDIA INDEPENDENT HANDOVER DCN: xxxx Title: Multiple MIH User Issues Date Submitted: November, 12-16, 2007.
IEEE MEDIA INDEPENDENT HANDOVER DCN: Title: Proposal for power consumption information related to different.
MuGM IEEE MEDIA INDEPENDENT HANDOVER DCN: MuGM Title: Suggested remedy for i-115 Date Submitted: Oct, 10, 2014 Presented.
IEEE MEDIA INDEPENDENT HANDOVER DCN:
IEEE MEDIA INDEPENDENT HANDOVER
IEEE MEDIA INDEPENDENT HANDOVER DCN: MuGM
IEEE MEDIA INDEPENDENT HANDOVER DCN: xx-00-sec
IEEE MEDIA INDEPENDENT HANDOVER DCN:
IEEE MEDIA INDEPENDENT HANDOVER DCN: xxx
IEEE MEDIA INDEPENDENT HANDOVER DCN: sec
IEEE MEDIA INDEPENDENT HANDOVER DCN: MuGM
IEEE MEDIA INDEPENDENT HANDOVER DCN:
IEEE MEDIA INDEPENDENT HANDOVER
IEEE MEDIA INDEPENDENT HANDOVER DCN: sec
IEEE MEDIA INDEPENDENT HANDOVER DCN: MuGM
IEEE MEDIA INDEPENDENT HANDOVER
IEEE MEDIA INDEPENDENT HANDOVER DCN: sec
IEEE MEDIA INDEPENDENT HANDOVER DCN: xxx
IEEE MEDIA INDEPENDENT HANDOVER DCN:
IEEE MEDIA INDEPENDENT HANDOVER DCN: xx-00-sec
IEEE MEDIA INDEPENDENT HANDOVER DCN:
IEEE MEDIA INDEPENDENT HANDOVER DCN:
IEEE MEDIA INDEPENDENT HANDOVER DCN: sec
IEEE MEDIA INDEPENDENT HANDOVER DCN: xxx
IEEE MEDIA INDEPENDENT HANDOVER DCN:
IEEE MEDIA INDEPENDENT HANDOVER DCN:
IEEE MEDIA INDEPENDENT HANDOVER DCN:
IEEE MEDIA INDEPENDENT HANDOVER
IEEE MEDIA INDEPENDENT HANDOVER
IEEE MEDIA INDEPENDENT HANDOVER DCN: sec
IEEE MEDIA INDEPENDENT HANDOVER DCN:
IEEE MEDIA INDEPENDENT HANDOVER
IEEE MEDIA INDEPENDENT HANDOVER DCN:
IEEE MEDIA INDEPENDENT HANDOVER
IEEE MEDIA INDEPENDENT HANDOVER DCN:
IEEE MEDIA INDEPENDENT HANDOVER DCN: sec
IEEE MEDIA INDEPENDENT HANDOVER
IEEE MEDIA INDEPENDENT HANDOVER DCN:
IEEE MEDIA INDEPENDENT HANDOVER DCN: sec
IEEE MEDIA INDEPENDENT HANDOVER DCN: Title: Group management in MIHF Date Submitted: November 4, 2011 Presented at IEEE session #47 in Atlanta.
IEEE MEDIA INDEPENDENT HANDOVER DCN: sec
IEEE MEDIA INDEPENDENT HANDOVER DCN: Title: Your Title Here
IEEE MEDIA INDEPENDENT HANDOVER DCN: xx-00-sec
IEEE MEDIA INDEPENDENT HANDOVER DCN: xx-00-sec
IEEE MEDIA INDEPENDENT HANDOVER DCN: mugm
IEEE MEDIA INDEPENDENT HANDOVER
IEEE MEDIA INDEPENDENT HANDOVER DCN: sec
Presentation transcript:

IEEE MEDIA INDEPENDENT HANDOVER DCN: REVP-Proposal-on-the-security-of Title: Proposal on the security of Date Submitted: May 13, 2015 Presented at IEEE session #68 in Vancouver, Canada Authors or Source(s): Yuji Unagami, Yusuke Shimizu(Panasonic) Abstract: This document proposed a security of the We have been studying to use standard as the security technology with HEMS. We propose two items for flexible implementation REVP-Proposal-on-the-security-of

IEEE presentation release statements This document has been prepared to assist the IEEE Working Group. It is offered as a basis for discussion and is not binding on the contributing individual(s) or organization(s). The material in this document is subject to change in form and content after further study. The contributor(s) reserve(s) the right to add, amend or withdraw material contained herein. The contributor grants a free, irrevocable license to the IEEE to incorporate material contained in this contribution, and any modifications thereof, in the creation of an IEEE Standards publication; to copyright in the IEEE’s name any IEEE Standards publication even though it may include portions of this contribution; and at the IEEE’s sole discretion to permit others to reproduce in whole or in part the resulting IEEE Standards publication. The contributor also acknowledges and accepts that this contribution may be made public by IEEE The contributor is familiar with IEEE patent policy, as outlined in Section 6.3 of the IEEE-SA Standards Board Operations Manual and in Understanding Patent Issues During IEEE Standards Development Section 6.3 of the IEEE-SA Standards Board Operations Manualhttp://standards.ieee.org/guides/opman/sect6.html#6.3 IEEE presentation release statements This document has been prepared to assist the IEEE Working Group. It is offered as a basis for discussion and is not binding on the contributing individual(s) or organization(s). The material in this document is subject to change in form and content after further study. The contributor(s) reserve(s) the right to add, amend or withdraw material contained herein. The contributor grants a free, irrevocable license to the IEEE to incorporate material contained in this contribution, and any modifications thereof, in the creation of an IEEE Standards publication; to copyright in the IEEE’s name any IEEE Standards publication even though it may include portions of this contribution; and at the IEEE’s sole discretion to permit others to reproduce in whole or in part the resulting IEEE Standards publication. The contributor also acknowledges and accepts that this contribution may be made public by IEEE The contributor is familiar with IEEE patent policy, as stated in Section 6 of the IEEE-SA Standards Board bylaws and in Understanding Patent Issues During IEEE Standards Development Section 6 of the IEEE-SA Standards Board bylawshttp://standards.ieee.org/guides/bylaws/sect6-7.html# REVP-Proposal-on-the-security-of

Background of this proposal Japanese Government(METI: Ministry of Economy, Trade and Industry) is leading the initiative to achieve HEMS(Home Energy Management System) systems. Note: Currently Each manufacture is using their own proprietary technology. Panasonic is one of the board member of this initiative to utilize ECHONET-Lite protocol for seamless communication between various home appliance product. Panasonic has been studying to use standard as the security technology with ECHONET-Lite. Home gateway device Currently Home gateway Future Proprietary non- interoperability non- interoperability Interoperability with standardized Interoperability with standardized Home gateway device REVP-Proposal-on-the-security-of

Background of this proposal We are studying to use d protocol for HEMS in Japan market. PoS with Group Manager : home gateway PoS : device(e.g. air conditioner, sensor, etc..) Flexible implementation is very important for the use of d. Processing of signature for each multicast transmission is too burden for air conditioner. PoS with Group Manager PoS MN Multicast Transport REVP-Proposal-on-the-security-of

ID_TYPE of SAID TLV Add new parameter in “ID_TYPE” field for the use of other key management technology. e.g. ECDH, Key distribution from the PoS with Group Manager, etc. TYPELENGTHSEQUENCE (ID_TYPE, ID_VALUE) SAID TLV ID_TYPE 0: TLS-generated 1: EAP-generated 2: GKB-generated 3: Other-generated REVP-Proposal-on-the-security-of

MIC of AES_CCM It is stated in the specification of d. (8.4.2) A Signature TLV should be used for multicast MIH messages in order to provide source origin authentication for multicast MIH massages. Otherwise, a message alternation(alteration?) attack by an insider who has a GKB SA is possible even if the multicast MIH message is integrity protected by the group key corresponding to the GKB SA. Signature verification process is too much burden for the low- power computing device, however, there should be some scheme to prevent tampering by a third party. MIH header (S=1) Source MIHF Identifier TLV Destination MIHF Identifier TLV SAID TLVService Specific TLV AES_CCM MIH header (S=1) Source MIHF Identifier TLV Destination MIHF Identifier TLV SAID TLV ENC_DATAMIC_DATA Security TLV a message alteration attack by a third party who does not have a GKB SA is possible REVP-Proposal-on-the-security-of

MIC of AES_CCM Generate MIC_DATA not only by Service Specific TLV but also MIH frame. MIH header (S=1) Source MIHF Identifier TLV Destination MIHF Identifier TLV SAID TLVService Specific TLV AES_CCM(MIC) AES_CCM(Enc) MIH header (S=1) Source MIHF Identifier TLV Destination MIHF Identifier TLV SAID TLV Security TLV ENC_DATAMIC_DATA Third party who does not have GKB SA can not execute alteration attack REVP-Proposal-on-the-security-of

Supplement REVP-Proposal-on-the-security-of

Background details Japanese Government is leading the initiative to achieve HEMS systems REVP-Proposal-on-the-security-of The scope of standardization in HEMS-TF I/F home appliance Stationary battery PV Reference Device List Smart meter PV(Photovoltaics) Stationary battery Fuel cell EVPS(EV Power Station) Air conditioner Lighting Hot water dispenser

Background details The Japanese government has recommended ECHONET Lite as standard interface REVP-Proposal-on-the-security-of home appliance housing equipment energy equipment Service Network Command Protocol ECHONET Lite standard Network of lower layer(PHY, MAC) Discussed in HEMS-TF Communication address using IP address IP address Reference

Background details HEMS-TF were selected standard media REVP-Proposal-on-the-security-of Reference Layer 5-7 Layer 4 Layer 3 Layer 2 Layer 1 Network layer Network of lower layer 920MHz 2.4GHzPLC Service 5GHz Ether net

Background details d is implemented between UDP and ECHONET Lite REVP-Proposal-on-the-security-of Reference Layer 5-7 Layer 4 Layer 3 Layer 2 Layer 1 920MHz 2.4GHzPLC5GHz Ether net d Including state machine, fragment. Including state machine, fragment.