Doc.: IEEE 802.15-15-0xxx-00-0010 Submission January 2015 N. Sato and K. Fukui (OKI)Slide 1 Project: IEEE P802.15 Working Group for Wireless Personal Area.

Slides:



Advertisements
Similar presentations
Doc.: IEEE Submission ETRI May 2013 Slide 1 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission.
Advertisements

Doc.: IEEE Hop-Discuss Submission July 2014 Robert Moskowitz, Verizon Slide 1 Project: IEEE P Working Group for Wireless Personal.
Doc.: IEEE l2r Submission September 2012 N. Sato & K. FukuiSlide 1 Project: IEEE P Working Group for Wireless Personal Area Networks.
Doc.: IEEE Submission September 2014 N. Sato and K. Fukui (OKI)Slide 1 Project: IEEE P Working Group for Wireless Personal.
Doc.: IEEE Submission Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: Additional Comments.
Doc.: IEEE wng Submission May 2012 N. Sato, K. Fukui & T. HerbstSlide 1 Project: IEEE P Working Group for Wireless Personal Area.
<month year> doc.: IEEE < > <September 2017>
March 2004 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: [Synchronized Beacon Propagation for Spanning.
Project: IEEE Working Group for Wireless Personal Area Networks (WPANs) Submission Title: [Proposals for adding a version number and for the treatment.
Project: IEEE Working Group for Wireless Personal Area Networks (WPANs) Submission Title: [Proposals for adding a frame version number and for the.
<month year> doc.: IEEE s May 2015
Submission Title: [Add name of submission]
March 2012 doc.: IEEE March 2012 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title:
June 2006 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: [Proposed Scenarios for Usage Model Document.
Submission Title: [SG5 Closing Report Mar04]
doc.: IEEE <doc#>
<month year> <doc.: IEEE doc> May 2015
May 2010 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: [PIB Coordination in g] Date Submitted:
<month year> doc.: IEEE < > <September 2017>
<month year> doc.: IEEE < > <January 2018>
doc.: IEEE <doc#>
doc.: IEEE <doc#>
September Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: [ to adaptation.
May 2013 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: [Proposal of radio resource management architecture]
March 2008 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: [Toumaz response to TG6 Call for Applications]
<month year> doc.: IEEE < > <September 2017>
<May,2009> doc.: IEEE <doc .....> <July 2009>
<doc.: IEEE −doc>
Submission Title: Example of P2P route discovery
<month year> doc.: IEEE <xyz> January 2001
Nov 2013 Robert Moskowitz, Verizon
Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: [Discovery Procedure] Date Submitted:
<month year> doc.: IEEE < > <May 2017>
August, 2008 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: [Enhancing reliability of data transmission.
Jul 12, /12/10 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: Summary of L2R Preliminary Proposals.
<month year> <doc.: IEEE doc> September 2015
doc.: IEEE <doc#>
Submission Title: [One-to-many and many-to-many peering procedures]
Source: [Pat Kinney] Company [Kinney Consulting LLC]
平成31年2月 doc.: IEEE /424r1 November 2008
Submission Title: [Proposal for Short Address Multicast]
September Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: [ to adaptation.
平成31年2月 doc.: IEEE /424r1 November 2007
doc.: IEEE <doc#>
<month year> November, 2004
<month year> <doc.: IEEE doc> November 2015
Submission Title: [IEEE WPAN Mesh Reference Model]
doc.: IEEE <doc#>
<month year> doc.: IEEE / January 2005
doc.: IEEE /XXXr0 Sep 19, 2007 June 2009
<month year> <doc.: IEEE doc> May 2015
doc.: IEEE <doc#>
<month year>20 Jan 2006
Submission Title: [One-to-many and many-to-many peering procedures]
<month year> <doc.: IEEE doc> January 2016
<month year> doc.: IEEE August 2014
平成31年5月 doc.: IEEE /424r1 September 2007
<month year> doc.: IEEE May 2014
doc.: IEEE <doc#>
January 2000 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: [Study Group Summary and Motion for .15WG.
平成31年7月 doc.: IEEE /424r1 November 2007
Source: [Chunhui Zhu] Company [Samsung]
<month year> <doc.: IEEE doc> September 2015
August, 2008 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: [Improve the latency between GTS request.
<month year> <doc.: IEEE doc> March 2015
Submission Title: TG9ma Agenda for September Meeting
Submission Title: [Preamble structures for 4a]
Jan 2008 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: TeraHertz Closing Report Date Submitted: January.
May 2014 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: TG9 Hop Discussion Date Submitted: May 15, 2014.
12/15/2019 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: [AWGN Simulation Results] Date Submitted:
Presentation transcript:

doc.: IEEE xxx Submission January 2015 N. Sato and K. Fukui (OKI)Slide 1 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: [Security Aspect of L2R] Date Submitted: [ 13 January, 2015] Source1: [Noriyuki Sato, Kiyoshi Fukui] Company [OKI] Address [2-5-7 Hommachi chuo-ku, Osaka, Japan] Voice:[ ], FAX: [ ], Re: [This is the original document.] Abstract:[Summarize of L2R Security Aspect ] Purpose:[To initiate discussions] Notice:This document has been prepared to assist the IEEE P It is offered as a basis for discussion and is not binding on the contributing individual(s) or organization(s). The material in this document is subject to change in form and content after further study. The contributor(s) reserve(s) the right to add, amend or withdraw material contained herein. Release:The contributor acknowledges and accepts that this contribution becomes the property of IEEE and may be made publicly available by P

doc.: IEEE xxx Submission January 2015 N. Sato and K. Fukui (OKI)Slide 2 Security Aspect of L2R TG10 presentation 28 th August 2014 Noriyuki Sato / Kiyoshi Fukui OKI Electric Industry Co., Ltd.

doc.: IEEE xxx Submission Objective We intend to incorporate KMP as one of security mode of L2R With sharing and reviewing the current idea in TG10, we would like to clarify any issue exists. January 2015 N. Sato and K. Fukui (OKI)Slide 3

doc.: IEEE xxx Submission Overview of L2R PAN –PAN Coordinator initiates PAN –PAN Coordinator provides a unique short address within PAN L2R Mesh Tree –L2R can establish downstream and upstream route on which the tree root and each node communicate. –P2P communication is done on the route by combination of upward and downward via the tree root or on the route of shortest path by using reactive routing 3 Security modes –Non secured, Pre-shared and KMP –Security mode is announced by TC-IE in the beacon January 2015 N. Sato and K. Fukui (OKI)Slide 4

doc.: IEEE xxx Submission How to incorporate KMP into L2R (KMP) provides a transportation of key management protocol between a coordinator and a node using MAC link –KMP itself is out of scope of – supports a communication on a link (1-hop) and it doesn’t support multi-hop A joining node needs to communicate with PAN coordinator for KMP in L2R –A join node communicates a coordinator in radio range –The coordinator relays KMP message to the PAN coordinator using L2R –A frame between a joiner and the parent coordinator is with KMP IE –A frame between the parent coordinator and the PAN coordinator is with KMP IE and KMP Relay IE defined in L2R January 2015 N. Sato and K. Fukui (OKI)Slide 5

doc.: IEEE xxx Submission Procedure and messages secured January 2015 N. Sato and K. Fukui (OKI)Slide 6 Beacon has an IE which show what network runs here. A joiner choses appropriate network. Clear text or encrypted by common pre-shared key for joiners During association procedure, the parent router request unique short address to be assigned to the new joiner. Joiner – Parent: Clear text or encrypted by common pre-shared key for joiners Parent – PAN Coordinator: Secured by the keys share by KMP Joiner – Parent – PAN Coordinator: Secured by the keys share by KMP All L2R message in Beacon and MP are encrypted by the appropriate key distributed by KMP. A joiner selects tree which it joins to.

doc.: IEEE xxx Submission Architecture on January 2015 N. Sato and K. Fukui (OKI)Slide 7 Other service using MP Information elements KMP Service Key Management Protocol Data higher layer MP Information Element Shim Data MCPS MAC Services PHY Services Keys Configuration Key requests Data Traffic IE Frames

doc.: IEEE xxx Submission Architecture L2R with KMP January 2015 N. Sato and K. Fukui (OKI)Slide 8 Other service using MP Information elements KMP Service Key Management Protocol Data higher layer MP Information Element Shim Data MCPS MAC Services PHY Services Keys Configuration Key requests Data Traffic IE Frames Boot strap entity of higher layer L2R KMP Relay Keys per neighbor or per L2R

doc.: IEEE xxx Submission Joiner device behavior January 2015 N. Sato and K. Fukui (OKI)Slide 9 Other service using MP Information elements KMP Service Key Management Protocol Data higher layer MP Information Element Shim Data MCPS MAC Services PHY Services Keys Configuration Key requests Data Traffic IE Frames Boot strap entity of higher layer L2R KMP Relay Keys per neighbor or per L2R

doc.: IEEE xxx Submission Relay (Parent) device behavior January 2015 N. Sato and K. Fukui (OKI)Slide 10 Other service using MP Information elements KMP Service Key Management Protocol Data higher layer MP Information Element Shim Data MCPS MAC Services PHY Services Keys Configuration Key requests Data Traffic IE Frames Boot strap entity of higher layer L2R KMP Relay Keys per neighbor or per L2R

doc.: IEEE xxx Submission PAN Coordinator device behavior January 2015 N. Sato and K. Fukui (OKI)Slide 11 Other service using MP Information elements KMP Service Key Management Protocol Data higher layer MP Information Element Shim Data MCPS MAC Services PHY Services Keys Configuration Key requests Data Traffic IE Frames Boot strap entity of higher layer L2R KMP Relay Keys per neighbor or per L2R

doc.: IEEE xxx Submission Discussion A Do you see any issue on proposing architecture and procedure? January 2015 N. Sato and K. Fukui (OKI)Slide 12

doc.: IEEE xxx Submission Discussion B Security for PAN or security for tree –Assuming that communication between the parent and the PAN coordinator should be secured. –If we have security only for tree without common security for PAN, communication between the parent and the PAN coordinator will not be assured to be secured since it is up to security mode for tree. (If one of tree operates with non secured without common security for PAN, it is not assured that all message to the PAN coordinator is secured unless PAN coordinator is a member of secured tree.) Key parameters in data request primitive in L2R –If the common key in the L2R distributed by KMP, NHL of L2R or L2R can set appropriate key to invoke data request primitives of L2R and MAC. –If the individual link keys are distributed by KMP, NHL doesn’t aware which next hop is but l2R layer knows what is the next hop and can set appropriate link key to communicate with next hop. Address assignment and KMP needs PAN coordinator address and all nodes needs to routable to the PAN coordinator –If the PAN coordinator doesn’t join to any tree, …. –If a joiner node wants to join the tree A but the PAN coordinator belongs to tree B, ….  A special tree to which all nodes join solves this issue….. January 2015 N. Sato and K. Fukui (OKI)Slide 13