Secure Group Key Distribution in Constrained Environments with IKEv2

Slides:



Advertisements
Similar presentations
Agent-Based Coordination of Sensor Networks Alex Rogers School of Electronics and Computer Science University of Southampton
Advertisements

An Authentication Service Against Dishonest Users in Mobile Ad Hoc Networks Edith Ngai, Michael R. Lyu, and Roland T. Chin IEEE Aerospace Conference, Big.
1 Secure Zero Configuration in a Ubiquitous Computing Environment Shenglan Hu and Chris J. Mitchell Information Security Group Royal Holloway, University.
A Study on Mobile P2P Systems Hongyu Li. Outline  Introduction  Characteristics of P2P  Architecture  Mobile P2P Applications  Conclusion.
OAuth/UMA for ACE 24 th March 2015 draft-maler-ace-oauth-uma-00.txt Eve Maler, Erik Wahlström, Samuel Erdtman, Hannes Tschofenig.
MASY: Management of Secret keYs in Mobile Federated Wireless Sensor Networks Jef Maerien IBBT DistriNet Research Group Department of Computer Science Katholieke.
Capita Selecta Distributed Systems Danny Hughes, Wouter Joosen, Sam Michiels, Eddy Truyen IBBT-DistriNet, KULeuven September
EMP: A Network Management Protocol for IP-Based Wireless Sensor Networks 2010 International Conference on Communication in Wireless Environments and Ubiquitous.
Wireless Networks Breakout Session Summary September 21, 2012.
Overlay Network Physical LayerR : router Overlay Layer N R R R R R N.
Trust- and Clustering-Based Authentication Service in Mobile Ad Hoc Networks Presented by Edith Ngai 28 October 2003.
Efficient Group Key Management in Wireless LANs Celia Li and Uyen Trang Nguyen Computer Science and Engineering York University.
- A. Celesti et al University of Messina, Italy Enhanced Cloud Architectures to Enable Cross-Federation Presented by Sanketh Beerabbi University of Central.
Introduction to Networking. What is a Network? Discuss in groups.
 Attacks and threats  Security challenge & Solution  Communication Infrastructure  The CA hierarchy  Vehicular Public Key  Certificates.
Sensor network routing protocol for underground robot remote control Demonstration picture (IDF)
Cryptography and Network Security Chapter 14 Fifth Edition by William Stallings Lecture slides by Lawrie Brown.
Security and Performance Trade-off in wireless sensor network
Networks – Network Fundamentals
Presented by Edith Ngai MPhil Term 3 Presentation
Secure Connected Infrastructure
GridOS: Operating System Services for Grid Architectures
Developing IoT endpoints with mbed Client
Secure M2M communication in Wireless Sensor Network
Raspberry Pi.
Trustworthiness Management in the Social Internet of Things
M. Kassab, A. Belghith, J. Bonnin, S. Sassi
Networks By Lawrence standen.
Implementing Network Access Protection
Intrusion Tolerance for NEST
Discussions on FILS Authentication
ROMANO - A Novel Overlay Lightweight Communication Protocol
Algorithms for Big Data Delivery over the Internet of Things
R&D for HL-LHC from the CWP
Key agreement in wireless sensor network
National Mining University
CS691 M2009 Semester Project PHILIP HUYNH
مقدمة في الحاسب الآلي T. Arwa Alsarami.
Securing Access to Mobile Operator Core Networks using IKEv2
Network Types & Speed Learning Objectives:
Adhoc and Wireless Sensor Networks
January 15th Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: [Security protocol for Body area networks]
An Introduction to Computer Networking
Component-Based Software Engineering: Technologies, Development Frameworks, and Quality Assurance Schemes X. Cai, M. R. Lyu, K.F. Wong, R. Ko.
AGENT OS.
SLICT: Secure Localized Information Centric Things
Blockchain Technology and IoT Security Andy Wang March 21, 2018
A Cognitive Approach for Cross-Layer Performance Management
The Globus Toolkit™: Information Services
high performance computing
Security & .NET 12/1/2018.
Path key establishment using multiple secured paths in wireless sensor networks CoNEXT’05 Guanfeng Li  University of Pittsburgh, Pittsburgh, PA Hui Ling.
09/12/2018 Virtual Networks.
Strong Password Authentication Protocols
Information Centric Things
Chapter-6 Access Network Design.
Advanced Computer Networks
Next-generation Internet architecture
Universal Serial Bus (USB)
Bing Liu, Yuefeng Wu IETF July 2017
DTLS Key Establishment for IoT
SPIRAL: Security Protocols for Cerberus
What is “Control System” or “Framework”?
Internet of Things and Access Control
HUMAN COMPUTER INTERACTION. The main aims of the chapter are to: Explain the difference between good and poor interaction design. Describe what interaction.
Lightweight Security Scheme for Vehicle Tracking System Using CoAP
A Firmware Update Architecture for Internet of Things Devices
Fourth ITU Workshop on Network 2030
Presentation transcript:

Secure Group Key Distribution in Constrained Environments with IKEv2 Nils gentschen Felde, Tobias Guggemos, Tobias Heider and Dieter Kranzlmüller MNM-Team Ludwig-Maximilians-Universität München Secure Group Key Distribution in Constrained Environments with IKEv2 2017 IEEE Conference on Dependable and Secure Computing Taipei • Taiwan Secure Group Key Distribution in Constrained Environments with IKEv2

Typical IoT Management Architecture ID Management Access Management Key Management ????? Secure Group Key Distribution in Constrained Environments with IKEv2

Question Group key distribution also enables universal key distribution In this work, we focus on the problem of Key Management in the special case of group communication includes most major IoT-related communication models Securing groups can help securing IoT in general Secure Group Key Distribution in Constrained Environments with IKEv2

Challenge of interoperability Re-using existing solution and make them suitable for constrained environments Secure Group Key Distribution in Constrained Environments with IKEv2

Re-use existing solutions Requires specifications for Group Managment Widely used and standardized for constrained networks Secure Group Key Distribution in Constrained Environments with IKEv2

Re-use existing solutions Especially designed for group managment 7 messages for key distribution  Too heavy for constrained environments Secure Group Key Distribution in Constrained Environments with IKEv2

Re-use existing solutions - Does not scale for large groups - Not useful for WANs No central authority Secure Group Key Distribution in Constrained Environments with IKEv2

Re-use existing solutions Problem with trust in dynamic environments Reduces Network and computing overhead Secure Group Key Distribution in Constrained Environments with IKEv2

Re-use existing solutions Not widely supported - Designed for GKM - Based on IKEv2, which is optimized for IoT Secure Group Key Distribution in Constrained Environments with IKEv2

How does G-IKEv2 perform on constrained environments Evaluation How does G-IKEv2 perform on constrained environments Secure Group Key Distribution in Constrained Environments with IKEv2

Testbed Devices Arduino Uno Arduino M0+ Arduino Due Architecture ATmega328 ARM Cortex-M0+ ARM Cortex-M3 CPU 16 MHz 48 MHz 84 MHz RAM 2 KB 32 KB 96 KB Flash 256 KB 512 KB Operating System RIOT OS Secure Group Communication - A Gap Analysis

The G-IKEv2 Protocol Secure Group Key Distribution in Constrained Environments with IKEv2

Implementation Secure Group Key Distribution in Constrained Environments with IKEv2

Evaluation Asymmetric EC Diffie Hellman Only ones for initial connection with key server Secure Group Key Distribution in Constrained Environments with IKEv2

Group Management will become more important for IoT Conclusion Group Management will become more important for IoT GKM is widely studied, but underrepresented for constrained scenarios IKEv2 is already used for Key Distribution in Wireless Networks (e.g. 802.15.4)  G-IKEv2 is an interesting option for group key management in IoT scenarios Secure Group Key Distribution in Constrained Environments with IKEv2

Ludwig-Maximilians-Universität München The End Curious? MNM-Team Ludwig-Maximilians-Universität München http://www.mnm-team.org/projects/embedded Secure Group Key Distribution in Constrained Environments with IKEv2