Authenticated Validity for M2M devices IEEE 802.16 Presentation Submission Template (Rev. 9) Document Number: IEEE S802.16p-11/0251 Date Submitted: 2011-09-09.

Slides:



Advertisements
Similar presentations
1 Proposed AWD Text for Coverage and Capacity Optimization (SON) IEEE Presentation Submission Template (Rev. 9) Document Number: IEEE S802.16m-09/1742.
Advertisements

Relay DG Report (for Session #63.5 TGm Closing) IEEE Presentation Submission Template (Rev. 9) Document Number: C80216m-09_2211r1 Date Submitted:
Interference Mitigation by Initial Configuration for Femtocell Access Points in IEEE802.16m Network IEEE Presentation Submission Template (Rev.
Contribution to IEEE n System Requirements Document IEEE Presentation Submission Template (Rev. 9) Document Number: IEEE C802.16gman-10/0018.
Security Support for Multi-cast Traffic in M2M communication Document Number: IEEE C802.16p-10/0022 Date Submitted: Source: Inuk Jung, Kiseon.
MAC support for LBS in IEEE802.16m Document Number: C80216m-09_1986 Date Submitted: Source: Kiseon Ryu, Jinsoo Choi, Ronny Kim, and Jin Sam.
M2M Study Report: Status Report IEEE Presentation Submission Template (Rev. 9) Document Number: IEEE C802.16ppc-10/0008 Date Submitted:
ARQ support for Primary Management connection IEEE Presentation Submission Template (Rev. 9) Document Number: IEEE S802.16maint-08/140 Date Submitted:
Relay DG Report (for Session #63.5 TGm Closing) IEEE Presentation Submission Template (Rev. 9) Document Number: C80216m-09_2211 Date Submitted:
Session # TGn Opening Report IEEE Presentation Submission Template (Rev. 9) Document Number: IEEE gman-10/0036 Date Submitted:
Group based paging operation for p system IEEE Presentation Submission Template (Rev. 9.2) Document Number: IEEE C80216p-10_0018 Date Submitted:
1 Sleep Cycle Configuration for Sleep Mode Operation Document Number: IEEE C802.16m-09/0972 Date Submitted: 2009/04/27 Source: Chung-Hsien Hsu, Yih-Shen.
1 Consideration on the Update Procedure of the System Information for M2M IEEE Presentation Submission Template (Rev. 9) Document Number: IEEE C80216p-10/0023r1.
Analysis of BR preamble selection strategies in 5-step BR procedure IEEE Presentation Submission Template (Rev. 9) Document Number: IEEE C80216m-10_1249r1.
Proposed Feature Rapporteur Group Timelines and Call for contributions IEEE Presentation Submission Template (Rev. 9) Document Number: IEEE C802.16m-09/0762r2.
1 Idle mode operation for supporting FemtoCells Document Number: IEEE C802.16m-08/1433 Date Submitted: Source: Giwon Park, Rony Yongho Kim,
Proposed changes for IEEE P802.16m/D1: Proximity based handover from macrocell to femtocell IEEE Presentation Submission Template (Rev.
Proposals on Update of S-SFH Document Number: C80216m-09_2893 Date Submitted: Source: Xianming Chen, Yanfeng Guan, Lei Zhang, Feng Xie, Yang.
16m Relay frame structure considering interfering issue IEEE Presentation Submission Template (Rev. 9) Document Number: IEEE C802.16m-08/1176r1.
Network Entry Procedure with Multi-Carrier Support Document Number: IEEE C802.16m-09/0966 Date Submitted: 2009/04/27 Source: I-Kang Fu, Yih-Shen Chen,
Text Proposals of HR-MS Forwarding in 16n Network IEEE Presentation Submission Template (Rev. 9) Document Number: IEEE S802.16n-11/0074 Date Submitted:
Security considerations for M2M IEEE Presentation Submission Template (Rev. 9) Document Number: IEEE ppc-10/0037 Date Submitted:
Security Support for Multi-cast Traffic in M2M communication Document Number: IEEE C802.16p-10/0032 Date Submitted: Source: Inuk Jung, Kiseon.
Extended MAC Header for System Information Update Notification ( ) Document Number: IEEE C80216m-10/0212 Date Submitted: Source: Yih-Shen.
1 IEEE MEDIA INDEPENDENT HANDOVER DCN: sec Title: Message Flow Date Submitted: March 1, 2011 Authors or Source(s): Fernando Bernal-Hidalgo,
Uplink Control Information Content for Bandwidth Request Channel IEEE Presentation Submission Template (Rev. 9) Document Number: IEEE C802.16m-09/0401.
Relay to Relay Communication - A SDD Proposal for m IEEE Presentation Submission Template (Rev. 9) Document Number: IEEE S802.16m-08/047 Date.
Doc.: IEEE /0310r0 Submission Sept 2007 Srinivas Sreemanthula Slide 1 IEEE MEDIA INDEPENDENT HANDOVER DCN: MIH-Security-Options.ppt.
Notice: This document does not represent the agreed views of the IEEE Working Group or any of its subgroups. It represents only the views of the.
Synchronization Drafting Group Schedule Document Number: IEEE C802.16m-09/0379 Date Submitted: Source: Paul Cheng
DC RG Report Document Number: IEEE C802.16n-11/0088 Date Submitted: Source: Ming-Tuo Zhou, Sungcheol Chang DC RG.
Coordinated AP for tightly coupled BS-AP interworking for Multi-RAT devices IEEE Presentation Submission Template (Rev. 9) Document Number: IEEE.
Definition of Device Collaboration Mode for Low Power Consumption IEEE Presentation Submission Template (Rev. 9) Document Number: IEEE C802.16p-10_0030.
Notification of SFH Updating ( ) Document Number: IEEE C80216m-09/2907 Date Submitted: Source: Yih-Shen Chen, Kelvin Chou and Paul Cheng.
Project Planning Committee Opening Report (Session #77) IEEE Presentation Submission Template (Rev. 9) Document Number: IEEE Gdoc.
Re-entry optimization ( ) Document Number: IEEE C802.16m-09/1837 Date Submitted: Source: Jin Lee, Ronny Kim, Kiseon Ryu, Jinsam Kwak .
1 Power Saving Considerations for IEEE m Femtocell IEEE Presentation Submission Template (Rev. 9) Document Number: IEEE C802.16m-08/1411 Date.
Collaborative uplink MIMO techniques for IEEE m Document Number: C80216m-08/638 Date Submitted: 7/7/2008 Source: Mohamed Abdallah Mohammed Nafie.
Relay/EMBS Ad-Hoc Group Report Document Number: IEEE C802.16m-09/2678r1 Date Submitted: Source: Kanchei(Ken) Loa Relay/LBS/EMBS.
Multi-Level Codes Sequence for Simultaneous MCS Feedback IEEE Presentation Submission Template (Rev. 9) Document Number: IEEE S80216m-08/1152 Date.
Control Procedure for Direct Communication IEEE Presentation Submission Template (Rev. 9) Document Number: IEEE C802.16n-11/0054 Date Submitted:
Session # Maintenance Task Group Opening and Agenda IEEE Presentation Submission Template (Rev. 9) Document Number: IEEE maint-09/0006.
HR-MS Discovery & Association Considerations for n IEEE Presentation Submission Template (Rev. 9) Document Number: IEEE C802.16n-10/0069r1.
Frame Structure Considerations for n IEEE Presentation Submission Template (Rev. 9) Document Number: IEEE C802.16n-11/0005 Date Submitted:
Notification of SFH Updating ( ) Document Number: IEEE C80216m-09/2907 Date Submitted: Source: Yih-Shen Chen, Kelvin Chou and Paul Cheng.
Project Planning Committee (PPC): Session #70 WG Opening Plenary Report IEEE Presentation Submission Template (Rev. 9) Document Number: IEEE.
Deregistration Identifier Analysis IEEE Presentation Submission Template (Rev. 9) Document Number: IEEE C80216m-10_1083r1 Date Submitted:
Clarification on the Usage of Femtocell Over The Air (OTA) Signaling ( ) Document Number: IEEE C802.16m-09/2603 Date Submitted: Source:
Lightweight Authentication Mode with Header Authentication IEEE Presentation Submission Template (Rev. 9) Document Number: IEEE S802.16m-08/907r1.
Clarification on Temporary Identifier of Idle AMS IEEE Presentation Submission Template (Rev. 9) Document Number: IEEE C802.16m-09/0839r2 Date Submitted:
IEEE Presentation Submission Template (Rev. 9) Document Number: IEEE C /0009 Date Submitted: Source(s): Shilpa Talwar, Kerstin.
Discussion of n System Requirements
Emergency Service – NS/EP Vs E-911 for IEEE m
IEEE Presentation Submission Template (Rev. 9) Document Number:
Mesh Topology for Relays
IEEE MEDIA INDEPENDENT HANDOVER DCN:
Project Planning Committee Opening Report
Project Planning Committee Opening Report (Session #77)
IEEE MEDIA INDEPENDENT HANDOVER DCN:
Dynamic Interference Mitigation for Femtocell Access Points in IEEE802
IEEE Presentation Submission Template (Rev. 9) Document Number:
Resource Shifting in Persistent Scheduling
Broadcast Handovers Tutorial Overview
IETF 16ng Working Group Update
Authenticated Validity for M2M devices
IEEE MEDIA INDEPENDENT HANDOVER DCN:
Network Synchronization Considerations for n
IEEE802.16e Security support for Group Management in M2M environment
IEEE MEDIA INDEPENDENT HANDOVER DCN: mugm
Treasurer’s Report Document Number: IEEE /0059
Presentation transcript:

Authenticated Validity for M2M devices IEEE Presentation Submission Template (Rev. 9) Document Number: IEEE S802.16p-11/0251 Date Submitted: Source: Eldad ZeiraVoice: InterDigital Venue: IEEE n at session #75 Base Contribution: C802.16p-11/0251 Purpose: To be discussed and adopted by p Notice: This document does not represent the agreed views of the IEEE Working Group or any of its subgroups. It represents only the views of the participants listed in the “Source(s)” field above. It is offered as a basis for discussion. It is not binding on the contributor(s), who reserve(s) the right to add, amend or withdraw material contained herein. Release: The contributor grants a free, irrevocable license to the IEEE to incorporate material contained in this contribution, and any modifications thereof, in the creation of an IEEE Standards publication; to copyright in the IEEE’s name any IEEE Standards publication even though it may include portions of this contribution; and at the IEEE’s sole discretion to permit others to reproduce in whole or in part the resulting IEEE Standards publication. The contributor also acknowledges and accepts that this contribution may be made public by IEEE Patent Policy: The contributor is familiar with the IEEE-SA Patent Policy and Procedures: and. Further information is located at and. 1

Authenticated Validity for M2M devices

IEEE S802.16p-11/0251 M2M networks are vulnerable M2M networks are more vulnerable to security threats due to longevity and field updates / provisioning M2M networks are required to handle critical missions without human intervention Attacks can lead to false situational awareness, loss of privacy, DOS In some cases network attacks = physical attacks EAP doesn’t protect from tampering

IEEE S802.16p-11/0251 M2M Vulnerabilities

IEEE S802.16p-11/ p Requirements: SRD 6.4Security Support The p system shall support integrity and authentication of M2M devices, as well as integrity and privacy of M2M application traffic which requires a secure connection The p system shall support a device validity check between the device and the network The p system shall enable a flexible security suite that can be adjusted per the security requirements of the M2M application

IEEE S802.16p-11/0251 We need to: Prevents a potentially tampered device from accessing services (e.g. multicast) and performing DOS attacks Provides the network with evidence of tampering –So owner can take action Imposes minimal burden on devices that do not require integrity validation: optionality of integrity validation –Must be able to mix different device types in single network

IEEE S802.16p-11/0251 The basis: Devices which need integrity validation have an (unspecified) difficult to tamper with module which can test the validity of the device as a whole. Failed devices must not attempt to connect… but that in itself does not provide the network with any validity proof

IEEE S802.16p-11/0251 What are our alternatives? A.Prevent release of EAP certificate if test failed B.Prevent release of EAP certificate if test failed + add information regarding this capability of the device Both require that EAP is made mandatory and used for key derivation C. Send certificate confirming the passing of the validity test after keys are established 1.In RNG-REQ 2.“higher layer” messages

IEEE S802.16p-11/0251 Network behavior: Device typeEAP certificate sentEAP certificate NOT sent Validity test capability indicated Authorize device-Do not authorize device -alert for rogue device Validity test capability NOT indicated N/ADo not authorize device Device typevalidity certificate sentvalidity certificate NOT sent Validity test capability indicated Authorize device for sensitive information -Expire keys -alert for rogue device Validity test capability NOT indicated N/A-Do not authorize device for sensitive information, BUT -allow other services Network behavior for Alt-A: Device typeEAP certificate sentEAP certificate NOT sent Not applicableAuthorize deviceDo not authorize device Network behavior for Alt-B: Network behavior for Alt-C: No difference between C-1 & C-2, as long as validity information is timely and there is a mechanism for retries if message fails. These already exist for RNG-REQ/RSP

IEEE S802.16p-11/0251 Conclusions: If EAP is used for the validity test then EAP must be mandatory Use of EAP does not allow to mix devices which have validity testing and those which have not. Both must be denied service. –If validity testing capability information is provided then the network has evidence of tampering. Sending a separate certificate (in addition to EAP or RSA) plus information regarding device type: –Allows to differentiate between devices with and without validity testing and offer different services to each –Doesn’t make EAP mandatory –Provides confidentiality to device type

IEEE S802.16p-11/0251 Elements of tamper detection & mitigation A Trusted Element (TE) tests for tampering –TE is NOT mandatory for all devices; Capability & implementation are out of scope –TE, if implemented, should be tamper resistant A device that fails the test does not attempt to access network Send Device Validity Information to network: within time limit, confidentially and with integrity protection, –Validity testing capability information (e.g. as H/W, S/W certificates) –Validation certificate (if implemented) - The only requirement mandatory to all devices in the network; -Needed to prevent tampered devices from pretending it doesn’t have the capability -Provides tampering evidence to network

IEEE S802.16p-11/0251 The network MAY, if device validity check IS: Successful, Establish additional keys that may be used for additional services –Multicast access –Sensitive user payload Unsuccessful, Cause key(s) to expire Send an (unspecified) command that affects device behavior (e.g. re-boot, “safe mode”, etc.)

IEEE S802.16p-11/0251 MS behavior for device integrity validation Un-touched Retries possible

IEEE S802.16p-11/0251 The procedure (1/2) 1.AMS that has a TE and failed the validity test shall not attempt to enter the network. 1.Provides protection from DOS attacks on AAA server; nature of protection depends on implementation. 2.The AMS sends its validity testing capability information (e.g. as H/W & S/W build certificates) and optionally its validation (integrity) certificate in AAI-REG-REQ. 1.Shifts integrity responsibility to network 2.Provides network with tampering attempt information 3.Part of the network access state machine 3.Out of scope for p: 1.ABS forwards the received information to the network. 2.If device validity is not acceptable, the network may expire keys. 3.Otherwise the network or AMS may initiate new services and new keys

IEEE S802.16p-11/0251 The procedure (2/2) 4.The ABS response in AAI-REG-RSP indicates whether the device validity has been accepted or not. 4.Prevents need to wait until next transmission to find out keys have been expired 5.AAI-REG-RSP with negative confirmation shall be interpreted as an abort. The AMS behavior in this case is FFS.