Doc.: IEEE 802.15-04-0540-01 Submission September 16, 2004 Poor & Struik / Ember & CerticomSlide 1 Project: IEEE P802.15 Working Group for Wireless Personal.

Slides:



Advertisements
Similar presentations
Doc.: IEEE b Submission March 2004 Robert Poor, Ember CorporationSlide 1 Project: IEEE P Working Group for Wireless Personal Area.
Advertisements

Doc.: IEEE b Submission March 2005 Robert Cragie, Jennic Ltd.Slide 1 Project: IEEE P Working Group for Wireless Personal Area.
Doc.: IEEE b Submission March 2005 Robert Cragie, Jennic Ltd.Slide 1 Project: IEEE P Working Group for Wireless Personal Area.
Doc.: b Submission May 2004 Robert Poor, Ember CorporationSlide 1 Project: IEEE P Working Group for Wireless Personal Area Networks.
Doc.: IEEE b Submission November 2004 Robert Cragie, Jennic Ltd.Slide 1 NOTE: Update all red fields replacing with your information;
Doc.: IEEE a-Updating-15-7-security Submission May 2015 Robert Moskowitz, HTT ConsultingSlide 1 Project: IEEE P Working Group for.
Doc.: IEEE e Submission November 13, 2008 René Struik (Certicom Research)Slide 1 Project: IEEE P Working Group for Wireless.
Doc.: IEEE s Submission January 2015 Mineo Takai, Space-Time EngineeringSlide 1 Project: IEEE P Working Group for Wireless Personal.
Submission January, 2005 Rene Struik, Certicom Corp.Slide 1 Project: IEEE P Working Group for Wireless Personal Area Networks.
Doc.: IEEE f Submission May 11, 2009 René Struik (Certicom Research)Slide 1 Project: IEEE P Working Group for Wireless Personal.
July 2014doc.: IEEE Submission Qing Li (InterDigital) Slide 1 Project: IEEE P Working Group for Wireless Personal Area Networks.
Doc.: IEEE Submission September 2004 Poor, Shao et al: Ember, Mitsubishi Electric Research LabsSlide 1 Project: IEEE P Working.
Doc.: IEEE /0389r1 Submission July 2004 Robert Poor, Ember CorporationSlide 1 Project: IEEE P Working Group for Wireless Personal Area Networks.
Doc.: IEEE /xxxr0 Submission Phil Jamieson November 2002 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission.
Doc.: IEEE /123r0 Submission February, 2002 Rene Struik, Certicom Corp.Slide 1 Project: IEEE P Working Group for Wireless Personal Area.
1 July, 2002 doc:.: /275r0 Daniel V. Bailey, Ari Singer, NTRU 1 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs)
Doc.: IEEE b Submission January 2005 Robert Cragie, Jennic Ltd.Slide 1 Project: IEEE P Working Group for Wireless Personal Area.
Doc.: IEEE b Submission March 2005 Robert Cragie, Jennic Ltd.Slide 1 Project: IEEE P Working Group for Wireless Personal Area.
Submission January, 2005 Rene Struik, Certicom Corp.Slide 1 Project: IEEE P Working Group for Wireless Personal Area Networks.
Doc.: IEEE b TG4b March 2005 Robert Poor - Ember CorporationSlide 1 Project: IEEE P Working Group for Wireless Personal Area.
Doc.: IEEE e Submission Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: [Security.
Doc.: IEEE Submission March 17, 2005 Poor & Struik / Ember & CerticomSlide 1 Project: IEEE P Working Group for Wireless Personal.
Doc.: IEEE Submission July 2014 Li, Hernandez, Dotlic, Miura, NICT Slide 1 Project: IEEE P Working Group for Wireless Personal.
Doc.: IEEE Submission November 16, 2004 Poor & Struik / Ember & CerticomSlide 1 Project: IEEE P Working Group for Wireless Personal.
Doc.: IEEE Submission November 18, 2004 Poor & Struik / Ember & CerticomSlide 1 Project: IEEE P Working Group for Wireless Personal.
Doc.: IEEE c SubmissionSlide 1 Qualcomm 2/29/2016 Slide 1 Project: IEEE P Working Group for Wireless Personal Area Networks.
Doc.: b Submission November 2004 Robert Poor, Ember Corp.; Marco Naeve, Eaton Corp. Slide 1 Project: IEEE P Working Group for Wireless.
Doc.: IEEE /0398r0 Submission July 2004 Robert Poor, Ember Corp.Slide 1 Project: IEEE P Working Group for Wireless Personal Area Networks.
Doc.: IEEE xxxxx Submission doc. : IEEE Slide 1 Junbeom Hur and Sungrae Cho, Chung-Ang University Project: IEEE P
Doc.: IEEE Submission, Slide 1 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: [Communicating.
Doc.: IEEE /250r0 Submission, Slide 1 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: IEEE :
Doc.: IEEE e Submission July 2009 Andy Summers, Skip Ashton, EmberSlide 1 Project: IEEE P Working Group for Wireless Personal.
Doc.: IEEE g Submission July 14, 2009 René Struik (Certicom Research)Slide 1 Project: IEEE P Working Group for Wireless Personal.
November 2004 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: [San Antonio Closing Report] Date Submitted:
June 16, 2018 doc.: IEEE r0 January, 2005
June 17, 2018 doc.: IEEE r0 January, 2005
doc.: IEEE <doc#>
doc.: IEEE <doc#>
doc.: IEEE <doc#>
June 2006 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: [Proposed Scenarios for Usage Model Document.
doc.: IEEE <doc#>
May 2018 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: [Considerations on general MAC frame] Date Submitted:
November 18, 2004 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: [Security Resolutions] Date Submitted:
December 2, 2018 doc.: IEEE r0 May, 2004
Name - WirelessHD August 2008
December 7, 2018 doc.: IEEE r0 July, 2003
September 2004 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: [Berlin Closing Report] Date Submitted:
Name - WirelessHD August 2008
May 2009 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: [ 1-octet MAC Header frame types ] Date Submitted:
July Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: [On unifying PPDU formats] Date Submitted:
doc.: IEEE <doc#>
January 16, 2019 doc.: IEEE r0 September, 2004
November 18, 2004 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: [Security Resolutions] Date Submitted:
<month year> <doc.: IEEE doc> Julyl 2015
February 24, 2019 doc.: IEEE r0 July, 2003
January 2005 doc.: IEEE /0055r0 September 2005
doc.: IEEE <doc#>
May 2018 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: [Considerations on general MAC frame] Date Submitted:
July 2012 Robert Moskowitz, Verizon
January 2005 doc.: IEEE /0055r0 September 2005
<month year> <doc.: IEEE doc> Julyl 2015
November 16, 2004 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: [Security Resolutions] Date Submitted:
doc.: IEEE <doc#>
doc.: IEEE <doc g>
doc.: IEEE <doc# >
doc.: IEEE <doc# >
July 15, 2019 doc.: IEEE r0 May, 2002 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: [AES.
March 2005 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: [Draft 1 security change proposal] Date Submitted:
doc.: IEEE <doc#>
August 2019 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: CID 422 Proposal Date Submitted: 14 August,
Presentation transcript:

doc.: IEEE Submission September 16, 2004 Poor & Struik / Ember & CerticomSlide 1 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: [Security Resolutions] Date Submitted: [15 September, 2004] Source: [Robert Poor (1), Rene Struik (2)] Company [(1) Ember Corporation, (2) Certicom Research] Address [(1) 343 Congress Street, 5th Floor, Boston, MA / (2) 5520 Explorer Drive, Fourth Floor, Mississauga, ON, L4W 5L1, Canada] Voice:[ ], FAX: [ ], Re: [Call For Contributions and PAR ] Abstract:[This document proposes resolutions to a set of issues relating to the security suite in IEEE ] Purpose:[This document is submitted for consideration for revisions to the specification.] Notice:This document has been prepared to assist the IEEE P It is offered as a basis for discussion and is not binding on the contributing individual(s) or organization(s). The material in this document is subject to change in form and content after further study. The contributor(s) reserve(s) the right to add, amend or withdraw material contained herein. Release:The contributor acknowledges and accepts that this contribution becomes the property of IEEE and may be made publicly available by P

doc.: IEEE Submission September 16, 2004 Poor & Struik / Ember & CerticomSlide 2 Security Resolutions Robert Poor (Ember Corporation) Rene Struik (Certicom Research)

doc.: IEEE Submission September 16, 2004 Poor & Struik / Ember & CerticomSlide 3 #14, #45: CCM* Description: The current 15.4 security suite is composed of three components: AES-CCM (for encryption and authentication), CBC-MAC (for authentication only), and AES-CTR (encryption only). Problem 1: These three separate components require a larger implementation (counted in gates or code) than the unified CCM* implementation. Problem 2: Switching between these modes compromises security unless you keep separate keys, which requires additional storage. Problem 3: CBC-MAC doesn’t provide freshness and is subject to replay attacks. Proposal: Replace security suite with CCM* as described in (replaces r0). (Note on backward compatibility: current specification allows devices to negotiate security, falling back to ‘no security’ as required.) PAR Compliance: “remove inflexible security use”

doc.: IEEE Submission September 16, 2004 Poor & Struik / Ember & CerticomSlide 4 #30: What fields are authenticated? Problem: The IEEE spec is ambiguous or unclear as to what components of a packet are subject to authentication. Proposal: Authenticate MAC header and MAC payload, i.e. everything except the FCS. (Refer to figure 34 in ). Clarify wording as suggested in b. PAR Compliance: Resolving ambiguities.

doc.: IEEE Submission September 16, 2004 Poor & Struik / Ember & CerticomSlide 5 Eliminate Key Sequence Counter Problem: In practice, Key Sequence Counter serves no useful function (is always fixed at 0), and generates one byte overhead in each security-enabled frame. Proposal: Eliminate Key Sequence Counter. This increases over the air efficiency, reduces the size of the ACL tables, simplifies processing in CCM. (Note on backward compatibility: If this change is introduced as part of CCM* update, there will be no backward compatibility issue.) PAR compliance: Removing unnecessary complexity, reduce MAC overhead, MAC header compression.

doc.: IEEE Submission September 16, 2004 Poor & Struik / Ember & CerticomSlide 6 #44: Security Endianess Clarification Problem: The definition of Least Significant Bit and Most Significant Bit is inconsistent between Section 7.6 and Annex B. Solution: Adopt solution presented in xxxx-00-security- endianess.doc PAR compliance: Resolve ambiguities.

doc.: IEEE Submission September 16, 2004 Poor & Struik / Ember & CerticomSlide 7 Broadcast Encryption Problem: Broadcast encryption does not provide freshness when using the default (broadcast) key, making the system subject to replay attacks. Proposal: Implement fix as described in document Receiver keeps track of the frame counter for each device sending to it using default key, similar to what is currently done for peer-to-peer traffic (which uses peer-to-peer keys). PAR Compliance: remove inflexible key usage, fix security holes, remove ambiguities

doc.: IEEE Submission September 16, 2004 Poor & Struik / Ember & CerticomSlide 8 Which Key to use for Peer to Peer Problem: Node A may have a shared key to use with Node B. If node B lacks that shared key, it will try to use the default key (aka broadcast key) when receiving a packet from Node A, resulting in a decryption failure. Higher level code cannot determine why the decryption failed. Proposal: Explicitly identify key is not a function of source and destination device (see document ) PAR compliance: remove inflexible key usage, remove ambiguities, reduce complexities

doc.: IEEE Submission September 16, 2004 Poor & Struik / Ember & CerticomSlide 9 Dynamic protection levels Problem: Nodes can only derive applicable security/protection level from statically maintained information, thus leading to unworkable broadcast encryption (if recipients have different security expectations) and high-cost system set-up Proposal 1: Differentiate applicable protection level on frame-by- frame basis; Proposal 2: differentiate minimum expected protection level Proposal 3: allow synchronization of expected protection levels on-the-fly PAR compliance: remove inflexible key usage, reduce complexities, reduce cost, reduce latency

doc.: IEEE Submission September 16, 2004 Poor & Struik / Ember & CerticomSlide 10 Group keying and multicast Problem: secure broadcast is not possible, if devices would change key over lifetime; secure multicast is also not possible Proposal 1: Incorporate secure broadcast over network’s lifetime; Proposal 2: incorporate secure multicast (and unsecured multicast) See also PAR compliance: remove inflexible key usage, reduce complexities, reduce key storage cost, reduce latency, incorporate multicast

doc.: IEEE Submission September 16, 2004 Poor & Struik / Ember & CerticomSlide 11 Compress security overhead if possible Problem: security overhead is substantial (currently 5 bytes per secured frame). Proposal 1: reduce frame counter overhead from 4 to 1 bytes per frame Proposal 2: piggyback on DSN entry for reduction of frame counter size by 1 further octet (thus eliminating it) See also 02/474r2 and PAR compliance: remove security overhead, reduce battery usage at no computational cost (1 integer increment only), eliminate risk of Denial of Service attack by insiders (!)

doc.: IEEE Submission September 16, 2004 Poor & Struik / Ember & CerticomSlide 12 Centralized frame counters Problem: frame counters depend on device and key, thus invoking quite a big key storage cost (Example: 16 RFD talk with coordinator using n versions of broadcast key  16 X n X 4=64 n bytes for frame counters) Proposal: centralize frame counters, such as to have these depend on device only (this requires #stored frame counter = # devices sending) See also PAR compliance: reduce storage requirements keying material