January 15th Project: IEEE P802.15 Working Group for Wireless Personal Area Networks (WPANs) Submission Title: [Security protocol for Body area networks]

Slides:



Advertisements
Similar presentations
Doc.: IEEE /317r0 Submission September, 2000 Allen Heberling, Eastman Kodak, CompanySlide 1 NOTE: Update all red fields replacing with your information;
Advertisements

Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: [On IETF LPWAN] Date Submitted: [10 July.
November 1999 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: [Mapping the Bluetooth Specification to.
March 01 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: TG4 RFWaves MAC Proposal Overview Date Submitted:
Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: [On IETF LPWAN] Date Submitted: [10 July.
July 2017 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: [Suitability Evaluation of Encryption Schemes]
Submission Title: [Add name of submission]
Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: [ULI protocol stack and flows of operations]
June 2006 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: [Proposed Scenarios for Usage Model Document.
March 01 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: TG4 RFWaves PHY Proposal Overview Date Submitted:
March 01 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: TG4 RFWaves PHY Proposal Overview Date Submitted:
Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: [On IETF LPWAN] Date Submitted: [10 July.
Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: [Add name of submission] Date Submitted:
doc.: IEEE <doc#>
May 2006 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: WiMedia Liason Report May 06 Date Submitted:
Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: [Summary of Available Channel Measurements/Models]
doc.: IEEE <doc#>
May 2010 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: [PIB Coordination in g] Date Submitted:
doc.: IEEE <doc#>
September Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: [ to adaptation.
doc.: IEEE <doc#>
Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: [Handling of non-ULI frame and Profile.
November, 2004 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: [Proposal for PostBeaconDelay in b]
NOV 01 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: [Application Specific Information Element] Date.
doc.: IEEE <doc#>
doc.: IEEE <doc#>
doc.: IEEE <doc#>
January, 2006 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: [60GHz Regulation in Germany] Date Submitted:
March 2008 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: [Toumaz response to TG6 Call for Applications]
<month year> doc.: IEEE <xyz> January 2001
doc.: IEEE <doc#>
Septe 2018 doc.: IEEE November 2018
May 2006 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: WiMedia Liason Report May 06 Date Submitted:
doc.: IEEE <doc#>
Submission Title: [WG WNG Liaison Report January08]
Septe 2018 doc.: IEEE November 2018
Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: [ULI protocol stack and flows of operations]
<month year> IEEE a <January 2006>
September 2005 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: [IEEE – Liaison Report] Date.
September Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: [ to adaptation.
Sept 2004 doc.: IEEE b Sept 2004 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title:
November 2005 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: [IEEE – UWB Forum Liaison Report]
<month year> doc.: IEEE ptc November 2012
doc.: IEEE /XXXr0 Sep 19, 2007 June 2009
doc.: IEEE <doc#>
September 2016 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: [Liaison Report on for September.
Submission Title: [Frame and packet structure in ]
October 2011 doc.: IEEE ptc August 2012
<month year>20 Jan 2006
<month year> doc.: IEEE <030158r0> January 2004
doc.: IEEE <doc#>
Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: [Resolution of TG6 Draft D0 comment.
doc.: IEEE <doc#>
September 2000 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: TG3 Rank Order Voting Process Description.
Jan 2016 doc.: IEEE Jan 2016 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: [Liaison.
<month year> doc.: IEEE ptc January 2014
January 2000 doc.: IEEE /020r0 January 2000
March 01 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: TG4 RFWaves MAC Proposal Overview Date Submitted:
Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: [OFDM extension to lower data rates] Date.
July 2010 <month year> doc.: IEEE g Doc.: IEEE g
Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: [Resolution of TG6 Draft D0 comments.
Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: [15.4j Coordinator Switching] Date Submitted:
Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: [Resolution of TG6 Draft D0 comment.
September 2008 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: [Suggested TG3c PAR Changes] Date Submitted:
March, 2006 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: [Summary of ad hoc meetings for potential.
September 2003 doc.: IEEE /0423 r0 September 2003
Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: [Resolution of TG6 Draft D0 comments.
Submission Title: TG9ma Agenda for September Meeting
Jan 2008 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: TeraHertz Closing Report Date Submitted: January.
Submission Title: TG9ma Closing Report for July Meeting
Presentation transcript:

January 15th Project: IEEE P802.15 Working Group for Wireless Personal Area Networks (WPANs) Submission Title: [Security protocol for Body area networks] Date Submitted: [The date the document is contributed, in the format “21 May, 1999”] Source: [Magnet Consortium] Company [Nokia] Address [] Voice:[], FAX: [], E-Mail:[karsten.vandrup@nokia.com, hossam.afifi@int-evry.fr] Re: [If this is a proposed revision, cite the original document.] [If this is a response to a Call for Contributions, cite the name and date of the Call for Contributions to which this document responds, as well as the relevant item number in the Call for Contributions.] [Note: Contributions that are not responsive to this section of the template, and contributions which do not address the topic under which they are submitted, may be refused or consigned to the “General Contributions” area.] Abstract: [security architecture for BAN devices. keying protocol for low power devices. Identity based on crypto signature. Encryption algorithms] Purpose: [potential solution for body area network security.] Notice: This document has been prepared to assist the IEEE P802.15. It is offered as a basis for discussion and is not binding on the contributing individual(s) or organization(s). The material in this document is subject to change in form and content after further study. The contributor(s) reserve(s) the right to add, amend or withdraw material contained herein. Release: The contributor acknowledges and accepts that this contribution becomes the property of IEEE and may be made publicly available by P802.15. NOTE: Update all red fields replacing with your information; they are required. This is a manual update in appropriate fields. All Blue fields are informational and are to be deleted. Black stays. After updating delete this box/paragraph. <author>, <company>

A Security Protocol for BAN January 15th A Security Protocol for BAN H. Afifi, S. Mirzadeh, F. Amretcht, K. Masmoudi <author>, <company>

Security procedures in this presentation January 15th Security procedures in this presentation Keying Unique identity Group management Encryption <author>, <company>

January 15th Requirements A security architecture that can be implemented on lightweight devices A security architecture that is strong enough to protect individuals The architecture respects all the known security requirements (confidentiality, integrity, PFS, etc…) <author>, <company>

doc.: IEEE 802.15-<doc#> <month year> doc.: IEEE 802.15-<doc#> January 15th Keying Assumptions The initiation of security is based on imprinting The user is in full control of the imprinting procedure, i.e. the user determines when and how a new device will be imprinted. Imprinting uses a proximity channel and We use a specific node that plays the role of initiation node. <author>, <company> <author>, <company>

January 15th Imprinting <author>, <company>

A channel that ensures a set of security properties January 15th The proximity channel A channel that ensures a set of security properties We have two kinds of channels Public : not totally secure Private : completely secure %M <author>, <company>

Two options First option: Diffie Helman on the proximity channel January 15th Two options First option: Diffie Helman on the proximity channel Enter PINs (variable length that depends on the hardware) on master and device Derive a permanent bilateral key Derive a session key that can be refreshed periodically Use the session key for encryption <author>, <company>

First option continued January 15th First option continued We use transitive imprinting to extend to other nodes Resulting key <author>, <company>

January 15th Second option Use elliptic curves to send a master node key to all the BAN The BAN devices can be revocated easily No need to transitive imprinting The BAN nodes communicate together as they share the public master node key <author>, <company>

Unique crypto-based ID January 15th Unique crypto-based ID Simply hash the nodes public key and the master node to have hierarchical crypto based ID. An id is truncated to the required BAN size (memory/CPU constrains) <author>, <company>

Group management January 15th BAN2 BAN1 <author>, <company>

Group management A simple algorithm sends access control tokens January 15th Group management A simple algorithm sends access control tokens We assure forward and backward security Revocation works also on group keys <author>, <company>

Encryption Any lightweight acceptable algorithm can be used January 15th Encryption Any lightweight acceptable algorithm can be used AES starts to be deployable on RFiDs We can select also an alternative stream cypher algorithm <author>, <company>

January 15th Complexity Diffie Helman takes on a Crossbow a few seconds to calculate the keys Elliptic Curves should take almost same time and they reduce the key size S. Fouladgar et al. A Trust Delegation Protocol For Wireless Sensor Networks Third European Workshop on Security and Privacy in Ad hoc and Sensor Networks <author>, <company>

January 15th Conclusion The Keying protocol is comparable to all the rest of keying 802.15 algorithms but it is newer… Crypto Identity is a way to solve the problem of addressing/identity Additional group keys can provide very flexible dynamic group communications <author>, <company>