Authenticated Validity for M2M devices

Slides:



Advertisements
Similar presentations
Authenticated Validity for M2M devices IEEE Presentation Submission Template (Rev. 9) Document Number: IEEE S802.16p-11/0251 Date Submitted:
Advertisements

Group based paging operation for p system IEEE Presentation Submission Template (Rev. 9.2) Document Number: IEEE C80216p-10_0018 Date Submitted:
Security considerations for M2M IEEE Presentation Submission Template (Rev. 9) Document Number: IEEE ppc-10/0037 Date Submitted:
Definition of Device Collaboration Mode for Low Power Consumption IEEE Presentation Submission Template (Rev. 9) Document Number: IEEE C802.16p-10_0030.
HR-MS Discovery & Association Considerations for n IEEE Presentation Submission Template (Rev. 9) Document Number: IEEE C802.16n-10/0069r1.
Frame Structure Considerations for n IEEE Presentation Submission Template (Rev. 9) Document Number: IEEE C802.16n-11/0005 Date Submitted:
Project Planning Committee (PPC): Next revision project
Session # Maintenance Task Group Opening and Agenda
[A Reliable Multicast Service in m]
MM RG Report Document Number: IEEE C802.16n-11/0083 Date Submitted:
Discussion of n System Requirements
Discussion of n System Requirements
Emergency Service – NS/EP Vs E-911 for IEEE m
Session # NRR Committee Closing Report
Session # Maintenance Task Group Opening Slides
A MAC Addressing in IEEE m
IEEE Presentation Submission Template (Rev. 9) Document Number:
Collaborative uplink MIMO techniques for IEEE m
Project Planning Committee (PPC): Report
IEEE Presentation Submission Template (Rev. 9) Document Number:
Proposal on Update of S-SFH
HO DG Meeting Minutes Document Number: IEEE S802.16m-09/0752
Mesh Topology for Relays
Project Planning Committee Opening Report
UL Control Ad-hoc group discussion summary
IEEE m SDD ToC for Inter RAT Handover
Session # Maintenance Task Group Closing Plenary Report
Project Planning Committee Opening Report (Session #77)
Dynamic Interference Mitigation for Femtocell Access Points in IEEE802
Two-hop Operation to Relay Packets between Two TDC Links
Title: LE TG Agenda for Session #53
Title: LE TG Agenda for Session #65
Title: LE TG Agenda for Session #63.5
Title: LE TG Closing Report for Session #56
IEEE Presentation Submission Template (Rev. 9) Document Number:
Session # n GRIDMAN TG Closing Report
Uplink Subframe Aggregation
MAP NACK Channel for Persistent Allocation
Session # Maintenance Task Group Opening Report
Session # Maintenance Task Group Opening and Agenda
Session # Maintenance Task Group Opening and Agenda
Session # Maintenance Task Group Opening and Agenda
Resource Shifting in Persistent Scheduling
Session # Maintenance Task Group Closing Report
Report of the Handover Rapporteur Group
Session # Maintenance Task Group Opening and Agenda
Session # Maintenance Task Group Opening and Agenda
Overview and definitions adhoc report
Broadcast Handovers Tutorial Overview
Uplink Subframe Aggregation
ITU-R Liaison Group Report - Session #52 Closing Plenary
IETF 16ng Working Group Update
Session # Maintenance Task Group Opening and Agenda
SON in IEEE m system IEEE Presentation Submission Template (Rev. 9)
Further Considerations to MS-MS Power Control
Network Coding Retransmission Design with Common Feedback Channel
Maximum number of hops for centralized scheduling mode
ITU-R Liaison Group Report - Session #52 Opening Plenary
Bandwidth Request Indicator
Project Planning Adhoc: WG Opening Plenary Report
Title: LE TG Agenda for Session #64
Network Synchronization Considerations for n
IEEE802.16e Security support for Group Management in M2M environment
Session # NRR Ad Hoc Committee Opening Report
HARQ and ARQ Interactions
Text Proposals of PHY Control Structure for 16n Direct Communication
Session # NRR Committee Closing Report
Treasurer’s Report Document Number: IEEE /0059
Session # NRR Ad Hoc Committee Report
ARQ protocol in m IEEE Presentation Submission Template (Rev. 9)
Presentation transcript:

Authenticated Validity for M2M devices IEEE 802.16 Presentation Submission Template (Rev. 9) Document Number: IEEE S802.16p-11/0093 Date Submitted: 2011-05-08 Source: Eldad Zeira Voice: InterDigital E-mail: eldad.zeira@interdigital.com Venue: IEEE 802.16n at session #73 Base Contribution: C802.16p-11/0093 Purpose: To be discussed and adopted by 802.16p Notice: This document does not represent the agreed views of the IEEE 802.16 Working Group or any of its subgroups. It represents only the views of the participants listed in the “Source(s)” field above. It is offered as a basis for discussion. It is not binding on the contributor(s), who reserve(s) the right to add, amend or withdraw material contained herein. Release: The contributor grants a free, irrevocable license to the IEEE to incorporate material contained in this contribution, and any modifications thereof, in the creation of an IEEE Standards publication; to copyright in the IEEE’s name any IEEE Standards publication even though it may include portions of this contribution; and at the IEEE’s sole discretion to permit others to reproduce in whole or in part the resulting IEEE Standards publication. The contributor also acknowledges and accepts that this contribution may be made public by IEEE 802.16. Patent Policy: The contributor is familiar with the IEEE-SA Patent Policy and Procedures: <http://standards.ieee.org/guides/bylaws/sect6-7.html#6> and <http://standards.ieee.org/guides/opman/sect6.html#6.3>. Further information is located at <http://standards.ieee.org/board/pat/pat-material.html> and <http://standards.ieee.org/board/pat >. 1

Authenticated Validity for M2M devices

M2M networks are vulnerable M2M networks are more vulnerable to security threats due to longevity and field updates / provisioning M2M networks are required to handle critical missions without human intervention Attacks can lead to false situational awareness, loss of privacy, DOS In some cases network attacks = physical attacks

M2M Vulnerabilities

802.16p Requirements: PAR Scope 5.2 Scope: This amendment specifies IEEE Std 802.16 medium access control (MAC) enhancements and minimal orthogonal frequency division multiple access (OFDMA) physical layer (PHY) modifications in licensed bands to support lower power consumption at the device, support by the base station of significantly larger numbers of devices, efficient support for small burst transmissions, and improved device authentication.

802.16p Requirements: SRD 6.4 Security Support The 802.16p system shall support integrity and authentication of M2M devices, as well as integrity and privacy of M2M application traffic which requires a secure connection. 6.4.1 The 802.16p system shall support a device validity check between the device and the network. 6.4.2 The 802.16p system shall enable a flexible security suite that can be adjusted per the security requirements of the M2M application

Provides the network with evidence of tampering This proposal: Prevents a potentially tampered device from accessing services and performing DOS attacks Provides the network with evidence of tampering So owner can take action Imposes minimal burden on devices that do not require integrity validation

Elements of tamper detection & mitigation A Trusted Element (TE) tests for tampering TE is NOT mandatory for all devices; Capability & implementation are out of scope TE, if implemented, should be tamper resistant A device that fails the test does not attempt to access network Send Device Validity Information to network: within time limit, confidentially and with integrity protection, Validity testing capability information (e.g. as H/W, S/W certificates) Validation certificate (if implemented) - The only requirement mandatory to all devices in the network; Needed to prevent tampered devices from pretending it doesn’t have the capability Provides tampering evidence to network

The network MAY, if device validity check IS: Successful, Unsuccessful, Establish additional keys that may be used for additional services The additional keys may be required to exchange sensitive user payload or access multicast channels Cause key(s) to expire Send an (unspecified) command that affects device behavior (e.g. re-boot, “safe mode”, etc.)

MS behavior for device integrity validation

The procedure: AMS that has a TE and failed test shall not attempt to enter the network. The AMS sends its validity testing capability information (e.g. as H/W & S/W build certificates) and optionally its validation (integrity) certificate in AAI-REG-REQ. Out of scope for 802.16p: (The ABS forwards the received information to the network. If the network decides that device validity was not acceptable, the network may expire keys. Otherwise the network or AMS may initiate new services and new keys) The ABS response in AAI-REG-RSP indicates whether the device validity has been accepted or not. AAI-REG-RSP with negative confirmation shall be interpreted as an abort. The AMS behavior in this case is FFS.