Discussion on TESLA Based Frame Authentication

Slides:



Advertisements
Similar presentations
Submission November 2010 doc.: IEEE /1236r0 Enhancements to Enablement Procedure Slide 1 Santosh Abraham, Qualcomm Incorporated Date:
Advertisements

IT 221: Introduction to Information Security Principles Lecture 5: Message Authentications, Hash Functions and Hash/Mac Algorithms For Educational Purposes.
Overall MAC Procedure for WUR
Broadcasting on WLAN Date: Authors: July 2017
Broadcasting on WLAN Date: Authors: September 2017
Securing the WUR Date: Authors: July 2016 March 2014
Consideration on Max Idle Period Extension for ah Power Save
Broadcasting on WLAN Date: Authors: July 2017
Broadcast Service on WLAN
Broadcast Service on WLAN
Follow-Up on WUR Discovery Frame and Discovery Channel
AP Discovery Information Broadcasting
July 2004 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: [Bi-Directional CTA] Date Submitted: [July.
WUR Discovery Frame Content
Groupcast discussion Date: Authors: Mar 2009 Month Year
Multiple BSSID and MU Date: Authors: Nov 2016 Liwen Chu
Follow-Up on WUR Discovery Frame and Discovery Channel
GAPA - Efficient, More Reliable Multicast
Follow-Up on WUR Discovery Frame and Discovery Channel
Wake Up Frame to Indicate Group Addressed Frames Transmission
Reason Why L2 Per Frame Authentication Is Required
Broadcast Management Frame Protection
Uplink Broadcast Service
Multiple Frequency Channel Scanning
Secure WUR frames Date: Authors: January 2018
Secure Ranging Measurement
WUR Discovery Frame Content
OCT based 6 GHz AP Operation Discussion
Wake up packet contents
TWT SP initiation and termination and legacy PS
Follow-Up on WUR Discovery Frame and Discovery Channel
Constrained Distributed MU-MIMO
Aggregate Block-ACK definition
CDK4: Chapter 7 CDK5: Chapter 11 TvS: Chapter 9
WUR Discovery Frame Content
Beacon Protection Date: Authors: July 2018 July 2018
Beacon Protection Date: Authors: May 2018 January 2018
WUR Discovery Frame Content
Follow-Up on WUR Discovery Frame and Discovery Channel
Month Year doc.: IEEE yy/xxxxr0
Follow-Up on WUR Discovery Frame and Discovery Channel
Packet Design for Wake-up Receiver (WUR)
WUR Discovery Frame Content
CDK: Chapter 7 TvS: Chapter 9
CID#89-Directed Multicast Service (DMS)
Rekeying Protocol Fix Date: Authors: Month Year
FTM Frame Exchange Authentication
Possible Enhancement for Broadcast Services over WLAN
Power Efficiency for Individually Addressed Frames Reception
Beacon Protection Date: Authors: July 2018 July 2018
Aggregate Block-ACK definition
Broadcast Use Cases from Event Producers
Consideration on Max Idle Period Extension for ah Power Save
Beacon Protection Date: Authors: May 2018 January 2018
Power Efficient WUR AP Discovery
TGbc Closing Report Date: Authors: March 2019
Power Efficiency for Individually Addressed Frames Reception
Secure SU and MU Ranging Measurement Procedure
Month Year doc.: IEEE yy/xxxxr0
Potential L2 security options for UL BCS
Broadcast Service on WLAN
Considerations on post wake-up sequences
Comparison of Digital Signature with TESLA
Discussion on Functional Requirements
Aug Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: [Explanation and Revision of Previous Time.
Peer Traffic Indication enhancements
LC MAC submission – follow up
TESLA Based Frame Authentication
Multi-Link Operation: Anchor Channel
Discussion on Multi-link Acknowledgement
Presentation transcript:

Discussion on TESLA Based Frame Authentication Month Year doc.: IEEE 802.11-yy/xxxxr0 September 2019 Discussion on TESLA Based Frame Authentication Date: 2019-09-18 Authors: Abhishek Patil, Qualcomm Inc John Doe, Some Company

Month Year doc.: IEEE 802.11-yy/xxxxr0 September 2019 Abstract TESLA based frame authentication has been proposed as a scheme for authenticating eBCS frames [1][2]. This presentation highlights a few shortcomings of the TESLA algorithm for TGbc members to consider. Abhishek Patil, Qualcomm Inc John Doe, Some Company

Recap: TESLA algorithm [2] September 2019 Recap: TESLA algorithm [2] TESLA is an algorithm that enables all receivers check integrity and authenticate the source of each frame in multicast or broadcast data stream. TESLA uses One-way key chain. One-way key chain is based on the nature of one-way hash function. In case of Vi+1 = Hash(Vi) Calculating Vi+1 from Vi is easy. Calculating Vi from Vi+1 is difficult. (practically impossible) Vi Vi+1 easy difficult Abhishek Patil, Qualcomm Inc

Recap: Frame Sequence [2] September 2019 Recap: Frame Sequence [2] eBCS Info frame includes Ks,N (where s is the seq num of eBCS Info) Ks-1,L (where L is the last used key index) Ks-1,L+1 (if d = 2) Timestamp TI TK d eBCS Info sequence number Public key with CA signature Signature by the sender’s private key eBCS Data frame includes Ks,i+2 (where s is the seq num of eBCS Info, d=2) As,i (Authenticator generated by the key K’s,i) Key index: i eBCS Info seq num: s Sender generates one-way key chain before generating each eBCS Info frame (Ks,N, Ks,N-1, Ks,N-2, …, Ks,0) eBCS Info frame Transmitted in TI interval eBCS Data frames TK TI Abhishek Patil, Qualcomm Inc

Can it address all use cases? September 2019 Can it address all use cases? The TESLA design intended for streaming services where continuous stream of traffic is broadcast. The scheme is not suitable if the frame transmissions are intermittent. For example event triggered aperiodic DL or UL Potential solution to aperiodic traffic: Transmitter sends dummy frames to keep a constant stream of frames carrying keys However, this will introduce unnecessary overhead Without such dummy broadcast, the receiver will be stuck waiting for the next set of frames to authenticate what was received so far (latency and memory requirements). Abhishek Patil, Qualcomm Inc

Loss of a single Info frames = loss of a set Data of frames September 2019 Loss of a single Info frames = loss of a set Data of frames If an info frame is lost, the set of frames sent during an interval TI cannot be verified. Channel conditions can frequently change, and there is no guarantee that all the receivers correctly receive the eBCS Info frame eBCS Info frame Transmitted in TI interval TK TI eBCS Data frames X Abhishek Patil, Qualcomm Inc

Attack scenario: Injection of fake Data frames September 2019 Attack scenario: Injection of fake Data frames Injection of false eBCS Data frames (i.e., frames carrying false authenticator information) can easily exhaust the receiver buffer For example: an attacker injects many eBCS Data frames that have the same sequence # and Key (both of which are not confidential info) but different data and authenticator By nature of the protocol, the receiver is required to store all frames as it doesn’t know which one is the correct one until the corresponding verification key disclosed later. In other words, there would be one correct data frame out of 100 frames, but the STA can only tell which one is correct after getting the key. Hitoshi Morioka, SRC Software

Other considerations September 2019 The periodicity and timing of eBCS Info frame is not known a priori As a result, if the periodicity of the eBCS Info frame is large, a client device may burn power in monitoring the medium to receive the Info frame carrying the configuration information before it can join the eBCS service Note, the configuration or periodicity information can’t be carried in Beacon frames since beacons are not protected Memory considerations: The algorithm will have an impact on memory requirement i.e., the receiver needs to buffer several frames before it can decrypt a frame that was received in the past. This may make it unsuitable for certain category of devices (e.g., cheap low power/low memory) Latency – due to the key-chaining nature of the algorithm, it introduces inherent latencies i.e., receiver needs to wait for future frames before it can authenticate past frames May make it unsuitable for certain use cases that focus on real-time or ultra low-latency applications Hardware impact? For use cases that need high speed data, the frame authentication may need to be done in hardware. This is a new algorithm that is not commonly seen in today’s systems There may be implementations that won’t be able to use existing hardware to work with this algorithm. This may go against BCS charter – i.e., to not require any hardware changes Abhishek Patil, Qualcomm Inc

September 2019 Summary The document provides a few limitations of the TESLA that the TGbc members need to consider before deciding on whether to use it as a protocol for eBCS frame authentication. The presenter requests that TGbc share the Tesla-based frame authentication proposal (e.g., [2]) with a wider group (e.g., 802.11 membership) to solicit feedback from experts in security domain. The objective is to help TGbc come-up with an authentication framework that works for all use cases and scenarios. Abhishek Patil, Qualcomm Inc

September 2019 Reference [1]:11-19/0451: eBCS Frame Authentication Proposal [2]: 11-19/1645: TESLA Based Frame Authentication Hitoshi Morioka, SRC Software