Optimizing DTLS for use in IoT

Slides:



Advertisements
Similar presentations
Adapted Multimedia Internet KEYing (AMIKEY): An extension of Multimedia Internet KEYing (MIKEY) Methods for Generic LLN Environments draft-alexander-roll-mikey-lln-key-mgmt-01.txt.
Advertisements

Secure Socket Layer.
Transport Layer Security (TLS) Protocol Introduction to networks and communications(CS555) Prof : Dr Kurt maly Student:Abhinav y.
What is EAP EAP stands for Extensible Authentication Protocol. Offers a basic framework for authentication. Many different authentication protocols can.
Encapsulation Security Payload Protocol Lan Vu. OUTLINE 1.Introduction and terms 2.ESP Overview 3.ESP Packet Format 4.ESP Fields 5.ESP Modes 6.ESP packet.
Seguridad en Sistemas de Información Francisco Rodríguez Henríquez SSL/TLS: An Introduction.
RTP Multiplexing draft-rosenberg-rtcweb-rtpmux Jonathan + {Rosenberg, Lennox}
CS 6401 IPv6 Outline Background Structure Deployment.
 It defines the format of the frame to be exchanged between devices.  It defines how two devices can negotiate the establishment of the link and the.
I-D: draft-rahman-mipshop-mih-transport-01.txt Transport of Media Independent Handover Messages Over IP 67 th IETF Annual Meeting MIPSHOP Working Group.
Cosc 4765 SSL/TLS and VPN. SSL and TLS We can apply this generally, but also from a prospective of web services. Multi-layered: –S-http (secure http),
IP Packet Tunneling and Routing in UMB March 26 th, 2007 Qualcomm/Alcatel-Lucent/Hitachi Notice Contributors grant a free, irrevocable license to 3GPP2.
Jun Li DHCP Option for Access Network Information draft-lijun-dhc-clf-nass-option-01.
1 Security Protocols in the Internet Source: Chapter 31 Data Communications & Networking Forouzan Third Edition.
Submission doc.: IEEE /1085r0 September 2015 Del Carpio (Ericsson)Slide 1 6LoWPAN over Date: Authors:
Overview of ROHC framework
SMUCSE 5349/7349 SSL/TLS. SMUCSE 5349/7349 Layers of Security.
Real-Time Streaming Protocol draft-ietf-mmusic-rfc2326bis-01.txt Magnus Westerlund.
Encryption protocols Monil Adhikari. What is SSL / TLS? Transport Layer Security protocol, ver 1.0 De facto standard for Internet security “The primary.
A RTCP-based Retransmission Protocol for Unicast RTP Streaming Multimedia draft-podolsky-avt-rtprx-00.txt Matthew Podolsky, Koichi Yano, and Steven McCanne.
NEA Working Group IETF meeting July 27, 2011 Jul 27, 2011IETF 81 - NEA Meeting1.
1 Review – The Internet’s Protocol Architecture. Protocols, Internetworking & the Internet 2 Introduction Internet standards Internet standards Layered.
ANCP Migration Carrier Analysis Thomas Haag; Birgit Witschurke,
PRESENTATION ON SECURE SOCKET LAYER (SSL) BY: ARZOO THAKUR M.E. C.S.E (REGULAR) BATCH
TLS/SSL Protocol Presented by: Vivek Nelamangala Includes slides presented by Miao Zhang on April Course: CISC856 - TCP/IP and Upper Layer Protocols.
SIP wg Items Jonathan Rosenberg dynamicsoft Caller Preferences: Changes Discussion of Redirects –Previous draft only proxy –Nothing different for redirect.
TOPIC: HTTPS (Security protocol)
Transmission of IP Packets over IEEE 802
Chapter 9: Transport Layer
Internet Protocol Version 6 Specifications
Carles Gomez Universitat Politècnica de Catalunya (UPC)/Fundació i2cat
Transport of Media Independent HO Messages over IP
Cryptography and Network Security
Secure Sockets Layer (SSL)
5. End-to-end protocols (part 1)
IETF 82 BFCPBIS WG Meeting
CSCE 715: Network Systems Security
Carles Gomez, Josep Paradells
Cryptography and Network Security Chapter 16
COMP3220 Web Infrastructure COMP6218 Web Architecture
GSS-API based Authentication and Key Establishment in TLS
Originally by Yu Yang and Lilly Wang Modified by T. A. Yang
CSE 4095 Transport Layer Security TLS, Part II
Net 431: ADVANCED COMPUTER NETWORKS
CSE 4095 Transport Layer Security TLS
Cryptography and Network Security
Multipath TCP improvements
Real Time Streaming Protocol
Cryptography and Network Security
On Scalability of In-Situ OAM draft-song-ippm-ioam-scalability-01
SSL (Secure Socket Layer)
CSCE 815 Network Security Lecture 16
TRANSMISSION CONTROL PROTOCOL
GeneRic Autonomic Signaling Protocol draft-ietf-anima-grasp-08
CS4470 Computer Networking Protocols
Transport Layer Security (TLS)
Steven Feltner reveller – IRC
Binary Floor Control Protocol BIS (BFCPBIS)
RFC 5539 Update Status draft-badra-netconf-rfc5539bis-00
DHCP: Dynamic Host Configuration Protocol
DNS SD Privacy Christian Huitema, Daniel Kaiser
Cryptography and Network Security
NFD Tunnel Authentication
Internet Protocol version 6 (IPv6)
Performance and Efficiency in Wireless Security
Working Group Draft for TCPCLv4
IPv6 Current version of the Internet Protocol is Version 4 (v4)
Presentation transcript:

Optimizing DTLS for use in IoT draft-mavrogiannopoulos-dtls-cid-00 draft-fossati-tls-iot-optimizations-00 IETF 97 Seoul

Overview RFC 7925 was written to provide guidance for use with TLS/DTLS in the IoT environment. Goal was to use TLS/DTLS as is. There are, however, cases where extensions would help. draft-fossati-tls-iot-optimizations-00 talks about those. Popular is Transport Agnostic Security Associations Reducing the DTLS Record Layer Header Overhead

Use Cases Long lasting CoAP/DTLS sessions with very little data sent will fail due to aggressive NAT timeouts Keep-alive traffic is not an option for sleepy/constrained devices, and neither is negotiating a new security association every time a new application protocol transaction is needed

Use Cases, cont. IoT device with radio technologies offering limited bandwidth, such as GSM, and low power WANs Handshaking over those is painful and basically limited to PSK

Requirements Work with DTLS 1.2 and later Optional behaviour Privacy-friendly whenever possible

Proposed Solution DTLS context de-muxing based on Transport independent identifier (CID) CID is negotiated using a new DTLS extension (ts_sa) CID is added to each DTLS record header Two ways to allocate the CID: Server decides unilaterally a value that is fixed for the duration of the session (SecAssocType.fixed) Server and Client agree on a sequence of values generated using HOTP [RFC 4226] seeded by the session shared secret (SecAssocType.hotp); Client shifts to the next value when needed (e.g. on transport handover)

Open Issues How to signal the other party that the wire format has changed Creative use of the version field? Are 32-bits enough to make HOTP usable for high load servers? Probability of CID collisions is already quite high with ~100 concurrent sessions Bigger cid (e.g., 5-6 bytes) when SecAssocType.hotp is negotiated

Implementation Three stacks have already showed their interest in implementing: mbedTLS, gnuTLS, and Scandium